aboutsummaryrefslogtreecommitdiffstats
path: root/arabic
diff options
context:
space:
mode:
authorMed <2029-med@users.noreply.salsa.debian.org>2023-11-25 07:31:18 +0000
committerMed <2029-med@users.noreply.salsa.debian.org>2023-11-25 07:31:18 +0000
commitfb042e5b4b67132a56cad08fab74ad6e2e295831 (patch)
treea5e7997c6f39dc415da1ed1c8257a429868e42e5 /arabic
parentb7ab7190d052e7863d72138e31fb4941e54da5f7 (diff)
(ar) 12.1/11.8/12.2 announcement, initial
Diffstat (limited to 'arabic')
-rw-r--r--arabic/News/2023/20230722.wml253
-rw-r--r--arabic/News/2023/20231007.wml318
-rw-r--r--arabic/News/2023/2023100702.wml366
3 files changed, 937 insertions, 0 deletions
diff --git a/arabic/News/2023/20230722.wml b/arabic/News/2023/20230722.wml
new file mode 100644
index 00000000000..9fb3711d4eb
--- /dev/null
+++ b/arabic/News/2023/20230722.wml
@@ -0,0 +1,253 @@
+#use wml::debian::translation-check translation="1f51232f1964140bbf71ecfd1fc7bdcbd252e744"
+<define-tag pagetitle>تحديث دبيان 12: الإصدار 12.1</define-tag>
+<define-tag release_date>2023-07-22</define-tag>
+
+#use wml::debian::news
+
+<define-tag release>12</define-tag>
+<define-tag codename>bookworm</define-tag>
+<define-tag revision>12.1</define-tag>
+
+<define-tag dsa>
+ <tr><td align="center"><a href="$(HOME)/security/%0/dsa-%1">DSA-%1</a></td>
+ <td align="center"><:
+ my @p = ();
+ for my $p (split (/,\s*/, "%2")) {
+ push (@p, sprintf ('<a href="https://packages.debian.org/src:%s">%s</a>', $p, $p));
+ }
+ print join (", ", @p);
+:></td></tr>
+</define-tag>
+
+<define-tag correction>
+ <tr><td><a href="https://packages.debian.org/src:%0">%0</a></td> <td>%1</td></tr>
+</define-tag>
+
+<define-tag srcpkg><a href="https://packages.debian.org/src:%0">%0</a></define-tag>
+
+<p>
+يسعد مشروع دبيان الإعلان عن التحديث الأول لتوزيعته المستقرة دبيان <release> (الاسم الرمزي <q><codename></q>).
+بالإضافة إلى تسوية بعض المشكلات الحرجة يصلح هذا التحديث بالأساس مشاكلات الأمان. تنبيهات الأمان أعلنت بشكل منفصل ومشار إليها فقط في هذا الإعلان.
+</p>
+
+<p>
+يرجى ملاحظة أن هذا التحديث لا يشكّل إصدار جديد لدبيان <release> بل فقط تحديثات لبعض الحزم المضمّنة
+وبالتالي ليس بالضرورة رمي الوسائط القديمة للإصدار <q><codename></q>، يمكن تحديث الحزم باستخدام مرآة دبيان محدّثة.
+</p>
+
+<p>
+الذين يثبّتون التحديثات من security.debian.org باستمرار لن يكون عليهم تحديث العديد من الحزم،
+أغلب التحديثات مضمّنة في هذا التحديث.
+</p>
+
+<p>
+صور جديدة لأقراص التثبيت ستكون متوفرة في موضعها المعتاد.
+</p>
+
+<p>
+يمكن الترقية من تثبيت آنيّ إلى هذه المراجعة بتوجيه نظام إدارة الحزم إلى إحدى مرايا HTTP الخاصة بدبيان.
+قائمة شاملة لمرايا دبيان على المسار:
+</p>
+
+<div class="center">
+ <a href="$(HOME)/mirror/list">https://www.debian.org/mirror/list</a>
+</div>
+
+
+
+
+<h2>إصلاح العديد من العلاّت</h2>
+
+<p>أضاف هذا التحديث للإصدار المستقر بعض الإصلاحات المهمة للحزم التالية:</p>
+
+<table border=0>
+<tr><th>الحزمة</th> <th>السبب</th></tr>
+<correction aide "Properly handle creating the system user; fix child directory processing on equal match">
+<correction autofs "Fix hang when using Kerberos-authenticated LDAP">
+<correction ayatana-indicator-datetime "Fix playing of custom alarm sounds">
+<correction base-files "Update for the 12.1 point release">
+<correction bepasty "Fix rendering of text uploads">
+<correction boost1.81 "Add missing dependency on libboost-json1.81.0 to libboost-json1.81-dev">
+<correction bup "Correctly restore POSIX ACLs">
+<correction context "Enable socket in ConTeXt mtxrun">
+<correction cpdb-libs "Fix a buffer overflow vulnerability [CVE-2023-34095]">
+<correction cpp-httplib "Fix CRLF injection issue [CVE-2023-26130]">
+<correction crowdsec "Fix default acquis.yaml to also include the journalctl datasource, limited to the ssh.service unit, making sure acquisition works even without the traditional auth.log file; make sure an invalid datasource doesn't make the engine error out">
+<correction cups "Security fixes: use-after-free [CVE-2023-34241]; heap buffer overflow [CVE-2023-32324]">
+<correction cvs "Configure full path to ssh">
+<correction dbus "New upstream stable release; fix denial of service issue [CVE-2023-34969]; stop trying to take DPKG_ROOT into account, restoring copying of systemd's /etc/machine-id in preference to creating an entirely new machine ID">
+<correction debian-installer "Increase Linux kernel ABI to 6.1.0-10; rebuild against proposed-updates">
+<correction debian-installer-netboot-images "Rebuild against proposed-updates">
+<correction desktop-base "Remove emerald alternatives on package uninstallation">
+<correction dh-python "Re-introduce Breaks+Replaces on python2 needed to help apt in some upgrade scenarios">
+<correction dkms "Add Breaks against obsolete, incompatible *-dkms packages">
+<correction dnf "Fix default DNF const PYTHON_INSTALL_DIR">
+<correction dpdk "New upstream stable release">
+<correction exim4 "Fix argument parsing for ${run } expansion; fix ${srs_encode ..} returning incorrect result every 1024 days">
+<correction fai "Fix IP address lifetime">
+<correction glibc "Fix a buffer overflow in gmon; fix a deadlock in getaddrinfo (__check_pf) with deferred cancellation; fix y2038 support in strftime on 32-bit architectures; fix corner case parsing of /etc/gshadow which can return bad pointers, causing segfaults in applications; fix a deadlock in system() when called concurrently from multiple threads; cdefs: limit definition of fortification macros to __FORTIFY_LEVEL &gt; 0 to support old C90 compilers">
+<correction gnome-control-center "New upstream bugfix release">
+<correction gnome-maps "New upstream bugfix release">
+<correction gnome-shell "New upstream bugfix release">
+<correction gnome-software "New upstream release; memory leak fixes">
+<correction gosa "Silence PHP 8.2 deprecation warnings; fix missing template in default theme; fix table styling; fix use of debugLevel &gt; 0">
+<correction groonga "Fix documentation links">
+<correction guestfs-tools "Security update [CVE-2022-2211]">
+<correction indent "Restore the ROUND_UP macro and adjust the initial buffer size">
+<correction installation-guide "Enable Indonesian translation">
+<correction kanboard "Fix malicious injection of HTML tags into DOM [CVE-2023-32685]; fix parameter-based indirect object referencing leading to private file exposure [CVE-2023-33956]; fix missing access controls [CVE-2023-33968, CVE-2023-33970]; fix stored XSS in Task External Link functionality [CVE-2023-33969]">
+<correction kf5-messagelib "Search also for subkeys">
+<correction libmatekbd "Fix memory leaks">
+<correction libnginx-mod-http-modsecurity "Binary rebuild with pcre2">
+<correction libreoffice "New upstream bugfix release">
+<correction libreswan "Fix potential denial-of-service issue [CVE-2023-30570]">
+<correction libxml2 "Fix NULL pointer dereference issue [CVE-2022-2309]">
+<correction linux "New upstream stable release; netfilter: nf_tables: do not ignore genmask when looking up chain by id [CVE-2023-31248], prevent OOB access in nft_byteorder_eval [CVE-2023-35001]">
+<correction linux-signed-amd64 "New upstream stable release; netfilter: nf_tables: do not ignore genmask when looking up chain by id [CVE-2023-31248], prevent OOB access in nft_byteorder_eval [CVE-2023-35001]">
+<correction linux-signed-arm64 "New upstream stable release; netfilter: nf_tables: do not ignore genmask when looking up chain by id [CVE-2023-31248], prevent OOB access in nft_byteorder_eval [CVE-2023-35001]">
+<correction linux-signed-i386 "New upstream stable release; netfilter: nf_tables: do not ignore genmask when looking up chain by id [CVE-2023-31248], prevent OOB access in nft_byteorder_eval [CVE-2023-35001]">
+<correction mailman3 "Drop redundant cron job; handle ordering of services when MariaDB is present">
+<correction marco "Show correct window title when owned by superuser">
+<correction mate-control-center "Fix several memory leaks">
+<correction mate-power-manager "Fix several memory leaks">
+<correction mate-session-manager "Fix several memory leaks; allow clutter backends other than x11">
+<correction multipath-tools "Hide underlying paths from LVM; prevent initial service failure on new installations">
+<correction mutter "New upstream bugfix release">
+<correction network-manager-strongswan "Build editor component with GTK 4 support">
+<correction nfdump "Return success when starting; fix segfault in option parsing">
+<correction nftables "Fix regression in set listing format">
+<correction node-openpgp-seek-bzip "Correct installation of files in seek-bzip package">
+<correction node-tough-cookie "Fix prototype pollution issue [CVE-2023-26136]">
+<correction node-undici "Security fixes: protect <q>Host</q> HTTP header from CLRF injection [CVE-2023-23936]; potential ReDoS on Headers.set and Headers.append [CVE-2023-24807]">
+<correction node-webpack "Security fix (cross-realm objects) [CVE-2023-28154]">
+<correction nvidia-cuda-toolkit "Update bundled openjdk-8-jre">
+<correction nvidia-graphics-drivers "New upstream stable release; security fixes [CVE-2023-25515 CVE-2023-25516]">
+<correction nvidia-graphics-drivers-tesla "New upstream stable release; security fixes [CVE-2023-25515 CVE-2023-25516]">
+<correction nvidia-graphics-drivers-tesla-470 "New upstream stable release; security fixes [CVE-2023-25515 CVE-2023-25516]">
+<correction nvidia-modprobe "New upstream bugfix release">
+<correction nvidia-open-gpu-kernel-modules "New upstream stable release; security fixes [CVE-2023-25515 CVE-2023-25516]">
+<correction nvidia-support "Add Breaks against incompatible packages from bullseye">
+<correction onionshare "Fix installation of desktop furniture">
+<correction openvpn "Fix memory leak and dangling pointer (possible crash vector)">
+<correction pacemaker "Fix regression in the resource scheduler">
+<correction postfix "New upstream bugfix release; fix <q>postfix set-permissions</q>">
+<correction proftpd-dfsg "Do not enable inetd-style socket at installation">
+<correction qemu "New upstream stable release; fix USB devices not being available to XEN HVM domUs; 9pfs: prevent opening special files [CVE-2023-2861]; fix reentrancy issues in the LSI controller [CVE-2023-0330]">
+<correction request-tracker5 "Fix links to documentation">
+<correction rime-cantonese "Sort words and characters by frequency">
+<correction rime-luna-pinyin "Install missing pinyin schema data">
+<correction samba "New upstream stable release; ensure manpages are generated during build; enable ability to store kerberos tickets in kernel keyring; fix build issues on armel and mipsel; fix windows logon/trust issues with 2023-07 windows updates">
+<correction schleuder-cli "Security fix (value escaping)">
+<correction smarty4 "Fix arbitrary code execution issue [CVE-2023-28447]">
+<correction spip "Various security issues; security fix (authentication data filtering)">
+<correction sra-sdk "Fix installation of files in libngs-java">
+<correction sudo "Fix event log format">
+<correction systemd "New upstream bugfix release">
+<correction tang "Fix race condition when creating/rotating keys [CVE-2023-1672]">
+<correction texlive-bin "Disable socket in luatex by default [CVE-2023-32668]; make installable on i386">
+<correction unixodbc "Add Breaks+Replaces against odbcinst1debian1">
+<correction usb.ids "Update included data">
+<correction vm "Disable byte compilation">
+<correction vte2.91 "New upstream bugfix release">
+<correction xerial-sqlite-jdbc "Use a UUID for connection ID [CVE-2023-32697]">
+<correction yajl "Memory leak security fix; fix denial of service issue [CVE-2017-16516], integer overflow issue [CVE-2022-24795]">
+</table>
+
+
+<h2>تحديثات الأمان</h2>
+
+
+<p>
+أضافت هذه المراجعة تحديثات الأمان التالية للإصدار المستقر.
+سبق لفريق الأمان نشر تنبيه لكل تحديث:
+</p>
+
+<table border=0>
+<tr><th>معرَّف التنبيه</th> <th>الحزمة</th></tr>
+<dsa 2023 5423 thunderbird>
+<dsa 2023 5425 php8.2>
+<dsa 2023 5427 webkit2gtk>
+<dsa 2023 5428 chromium>
+<dsa 2023 5429 wireshark>
+<dsa 2023 5430 openjdk-17>
+<dsa 2023 5432 xmltooling>
+<dsa 2023 5433 libx11>
+<dsa 2023 5434 minidlna>
+<dsa 2023 5435 trafficserver>
+<dsa 2023 5436 hsqldb1.8.0>
+<dsa 2023 5437 hsqldb>
+<dsa 2023 5439 bind9>
+<dsa 2023 5440 chromium>
+<dsa 2023 5443 gst-plugins-base1.0>
+<dsa 2023 5444 gst-plugins-bad1.0>
+<dsa 2023 5445 gst-plugins-good1.0>
+<dsa 2023 5446 ghostscript>
+<dsa 2023 5447 mediawiki>
+<dsa 2023 5448 linux-signed-amd64>
+<dsa 2023 5448 linux-signed-arm64>
+<dsa 2023 5448 linux-signed-i386>
+<dsa 2023 5448 linux>
+<dsa 2023 5449 webkit2gtk>
+<dsa 2023 5450 firefox-esr>
+<dsa 2023 5451 thunderbird>
+</table>
+
+
+
+<h2>مُثبِّت دبيان</h2>
+<p>
+حدِّث المُثبِّت ليتضمن الإصلاحات المندرجة في هذا الإصدار المستقر.
+</p>
+
+<h2>المسارات</h2>
+
+<p>
+القائمة الكاملة للحزم المغيّرة في هذه المراجعة:
+</p>
+
+<div class="center">
+ <url "https://deb.debian.org/debian/dists/<downcase <codename>>/ChangeLog">
+</div>
+
+<p>التوزيعة المستقرة الحالية:</p>
+
+<div class="center">
+ <url "https://deb.debian.org/debian/dists/stable/">
+</div>
+
+<p>التحديثات المقترحة للتوزيعة المستقرة:</p>
+
+<div class="center">
+ <url "https://deb.debian.org/debian/dists/proposed-updates">
+</div>
+
+<p>معلومات حول التوزيعة المستقرة (ملاحظات الإصدار والأخطاء إلخ):</p>
+
+<div class="center">
+ <a
+ href="$(HOME)/releases/stable/">https://www.debian.org/releases/stable/</a>
+</div>
+
+<p>معلومات وإعلانات الأمان:</p>
+
+<div class="center">
+ <a href="$(HOME)/security/">https://www.debian.org/security/</a>
+</div>
+
+<h2>حول دبيان</h2>
+
+<p>
+مشروع دبيان هو اتحاد لمطوري البرمجيات الحرة تطوعوا بالوقت والمجهود لإنتاج نظام تشعيل دبيان حر بالكامل.
+</p>
+
+<h2>معلومات الاتصال</h2>
+
+<p>
+لمزيد من المعلومات يرجى زيارة موقع دبيان
+<a href="$(HOME)/">https://www.debian.org/</a>
+أو إرسال بريد إلكتروني إلى &lt;press@debian.org&gt;
+أو الاتصال بفريق إصدار المستقرة على
+&lt;debian-release@lists.debian.org&gt;.
+</p>
+
+
diff --git a/arabic/News/2023/20231007.wml b/arabic/News/2023/20231007.wml
new file mode 100644
index 00000000000..7547acb5eaf
--- /dev/null
+++ b/arabic/News/2023/20231007.wml
@@ -0,0 +1,318 @@
+#use wml::debian::translation-check translation="b827d01d6caf2b68e865bd2c4ff78fab56ab8eb4"
+<define-tag pagetitle>تحديث دبيان 12: الإصدار 12.2</define-tag>
+<define-tag release_date>2023-10-07</define-tag>
+#use wml::debian::news
+
+<define-tag release>12</define-tag>
+<define-tag codename>bookworm</define-tag>
+<define-tag revision>12.2</define-tag>
+
+<define-tag dsa>
+ <tr><td align="center"><a href="$(HOME)/security/%0/dsa-%1">DSA-%1</a></td>
+ <td align="center"><:
+ my @p = ();
+ for my $p (split (/,\s*/, "%2")) {
+ push (@p, sprintf ('<a href="https://packages.debian.org/src:%s">%s</a>', $p, $p));
+ }
+ print join (", ", @p);
+:></td></tr>
+</define-tag>
+
+<define-tag correction>
+ <tr><td><a href="https://packages.debian.org/src:%0">%0</a></td> <td>%1</td></tr>
+</define-tag>
+
+<define-tag srcpkg><a href="https://packages.debian.org/src:%0">%0</a></define-tag>
+
+<p>
+يسعد مشروع دبيان الإعلان عن التحديث الثاني لتوزيعته المستقرة دبيان <release> (الاسم الرمزي <q><codename></q>).
+بالإضافة إلى تسوية بعض المشكلات الحرجة يصلح هذا التحديث بالأساس مشاكلات الأمان. تنبيهات الأمان أعلنت بشكل منفصل ومشار إليها فقط في هذا الإعلان.
+</p>
+
+<p>
+يرجى ملاحظة أن هذا التحديث لا يشكّل إصدار جديد لدبيان <release> بل فقط تحديثات لبعض الحزم المضمّنة
+وبالتالي ليس بالضرورة رمي الوسائط القديمة للإصدار <q><codename></q>، يمكن تحديث الحزم باستخدام مرآة دبيان محدّثة.
+</p>
+
+<p>
+الذين يثبّتون التحديثات من security.debian.org باستمرار لن يكون عليهم تحديث العديد من الحزم،
+أغلب التحديثات مضمّنة في هذا التحديث.
+</p>
+
+<p>
+صور جديدة لأقراص التثبيت ستكون متوفرة في موضعها المعتاد.
+</p>
+
+<p>
+يمكن الترقية من تثبيت آنيّ إلى هذه المراجعة بتوجيه نظام إدارة الحزم إلى إحدى مرايا HTTP الخاصة بدبيان.
+قائمة شاملة لمرايا دبيان على المسار:
+</p>
+
+<div class="center">
+ <a href="$(HOME)/mirror/list">https://www.debian.org/mirror/list</a>
+</div>
+
+
+
+
+<h2>إصلاح العديد من العلاّت</h2>
+
+<p>أضاف هذا التحديث للإصدار المستقر بعض الإصلاحات المهمة للحزم التالية:</p>
+
+<table border=0>
+<tr><th>الحزمة</th> <th>السبب</th></tr>
+<correction amd64-microcode "Update included microcode, including fixes for <q>AMD Inception</q> on AMD Zen4 processors [CVE-2023-20569]">
+<correction arctica-greeter "Support configuring the onscreen keyboard theme via ArcticaGreeter's gsettings; use <q>Compact</q> OSK layout (instead of Small) which includes special keys such as German Umlauts; fix display of authentication failure messages; use active theme rather than emerald">
+<correction autofs "Fix regression determining reachability on dual-stack hosts">
+<correction base-files "Update for the 12.2 point release">
+<correction batik "Fix Server Side Request Forgery issues [CVE-2022-44729 CVE-2022-44730]">
+<correction boxer-data "No longer install https-everywhere for Firefox">
+<correction brltty "xbrlapi: Do not try to start brltty with ba+a2 when unavailable; fix cursor routing and braille panning in Orca when xbrlapi is installed but the a2 screen driver is not">
+<correction ca-certificates-java "Work around unconfigured JRE during new installations">
+<correction cairosvg "Handle data: URLs in safe mode">
+<correction calibre "Fix export feature">
+<correction clamav "New upstream stable release; security fixes [CVE-2023-20197 CVE-2023-20212]">
+<correction cryptmount "Avoid memory initialisation issues in command line parser">
+<correction cups "Fix heap-based buffer overflow issue [CVE-2023-4504]; fix unauthenticated access issue [CVE-2023-32360]">
+<correction curl "Build with OpenLDAP to correct improper fetch of binary LDAP attributes; fix excessive memory consumption issue [CVE-2023-38039]">
+<correction cyrus-imapd "Ensure mailboxes are not lost on upgrades from bullseye">
+<correction dar "Fix issues with creating isolated catalogs when dar was built using a recent gcc version">
+<correction dbus "New upstream stable release; fix a dbus-daemon crash during policy reload if a connection belongs to a user account that has been deleted, or if a Name Service Switch plugin is broken, on kernels not supporting SO_PEERGROUPS; report the error correctly if getting the groups of a uid fails; dbus-user-session: Copy XDG_CURRENT_DESKTOP to activation environment">
+<correction debian-archive-keyring "Clean up leftover keyrings in trusted.gpg.d">
+<correction debian-edu-doc "Update Debian Edu Bookworm manual">
+<correction debian-edu-install "New upstream release; adjust D-I auto-partitioning sizes">
+<correction debian-installer "Increase Linux kernel ABI to 6.1.0-13; rebuild against proposed-updates">
+<correction debian-installer-netboot-images "Rebuild against proposed-updates">
+<correction debian-parl "Rebuild with newer boxer-data; no longer depend on webext-https-everywhere">
+<correction debianutils "Fix duplicate entries in /etc/shells; manage /bin/sh in the state file; fix canonicalization of shells in aliased locations">
+<correction dgit "Use the old /updates security map only for buster; prevent pushing older versions than are already in the archive">
+<correction dhcpcd5 "Ease upgrades with leftovers from wheezy; drop deprecated ntpd integration; fix version in cleanup script">
+<correction dpdk "New upstream stable release">
+<correction dput-ng "Update permitted upload targets; fix failure to build from source">
+<correction efibootguard "Fix Insufficient or missing validation and sanitization of input from untrustworthy bootloader environment files [CVE-2023-39950]">
+<correction electrum "Fix a Lightning security issue">
+<correction filezilla "Fix builds for 32-bit architectures; fix crash when removing filetypes from list">
+<correction firewalld "Don't mix IPv4 and IPv6 addresses in a single nftables rule">
+<correction flann "Drop extra -llz4 from flann.pc">
+<correction foot "Ignore XTGETTCAP queries with invalid hex encodings">
+<correction freedombox "Use n= in apt preferences for smooth upgrades">
+<correction freeradius "Ensure TLS-Client-Cert-Common-Name contains correct data">
+<correction ghostscript "Fix buffer overflow issue [CVE-2023-38559]; try and secure the IJS server startup [CVE-2023-43115]">
+<correction gitit "Rebuild against new pandoc">
+<correction gjs "Avoid infinite loops of idle callbacks if an idle handler is called during GC">
+<correction glibc "Fix the value of F_GETLK/F_SETLK/F_SETLKW with __USE_FILE_OFFSET64 on ppc64el; fix a stack read overflow in getaddrinfo in no-aaaa mode [CVE-2023-4527]; fix use after free in getcanonname [CVE-2023-4806 CVE-2023-5156]; fix _dl_find_object to return correct values even during early startup">
+<correction gosa-plugins-netgroups "Silence deprecation warnings in web interface">
+<correction gosa-plugins-systems "Fix management of DHCP/DNS entries in default theme; fix adding (standalone) <q>Network printer</q> systems; fix generation of target DNs for various system types; fix icon rendering in DHCP servlet; enforce unqualified hostname for workstations">
+<correction gtk+3.0 "New upstream stable release; fix several crashes; show more information in the <q>inspector</q> debugging interface; silence GFileInfo warnings if used with a backported version of GLib; use a light colour for the caret in dark themes, making it much easier to see in some apps, in particular Evince">
+<correction gtk4 "Fix truncation in places sidebar with large text accessibility setting">
+<correction haskell-hakyll "Rebuild against new pandoc">
+<correction highway "Fix support for armhf systems lacking NEON">
+<correction hnswlib "Fix double free in init_index when the M argument is a large integer [CVE-2023-37365]">
+<correction horizon "Fix open redirect issue [CVE-2022-45582]">
+<correction icingaweb2 "Suppress undesirable deprecation notices">
+<correction imlib2 "Fix preservation of alpha channel flag">
+<correction indent "Fix out of buffer read; fix buffer overwrite [CVE-2023-40305]">
+<correction inetutils "Check return values when dropping privileges [CVE-2023-40303]">
+<correction inn2 "Fix nnrpd hangs when compression is enabled; add support for high-precision syslog timestamps; make inn-{radius,secrets}.conf not world readable">
+<correction jekyll "Support YAML aliases">
+<correction kernelshark "Fix segfault in libshark-tepdata; fix capturing when target directory contains a space">
+<correction krb5 "Fix freeing of uninitialised pointer [CVE-2023-36054]">
+<correction lemonldap-ng "Apply login control to auth-slave requests; fix open redirection due to incorrect escape handling; fix open redirection when OIDC RP has no redirect URIs; fix Server Side Request Forgery issue [CVE-2023-44469]">
+<correction libapache-mod-jk "Remove implicit mapping functionality, which could lead to unintended exposure of the status worker and/or bypass of security constraints [CVE-2023-41081]">
+<correction libclamunrar "New upstream stable release">
+<correction libmatemixer "Fix heap corruptions / application crashes when removing audio devices">
+<correction libpam-mklocaluser "pam-auth-update: ensure the module is ordered before other session type modules">
+<correction libxnvctrl "New source package split from nvidia-settings">
+<correction linux "New upstream stable release">
+<correction linux-signed-amd64 "New upstream stable release">
+<correction linux-signed-arm64 "New upstream stable release">
+<correction linux-signed-i386 "New upstream stable release">
+<correction llvm-defaults "Fix /usr/include/lld symlink; add Breaks against not co-installable packages for smoother upgrades from bullseye">
+<correction ltsp "Avoid using mv on init symlink">
+<correction lxc "Fix nftables syntax for IPv6 NAT">
+<correction lxcfs "Fix CPU reporting within an arm32 container with large numbers of CPUs">
+<correction marco "Only enable compositing if it is available">
+<correction mariadb "New upstream bugfix release">
+<correction mate-notification-daemon "Fix two memory leaks">
+<correction mgba "Fix broken audio in libretro core; fix crash on hardware incapable of OpenGL 3.2">
+<correction modsecurity "Fix denial of service issue [CVE-2023-38285]">
+<correction monitoring-plugins "check_disk: avoid mounting when searching for matching mount points, resolving a regression in speed from bullseye">
+<correction mozjs102 "New upstream stable release; fix <q>incorrect value used during WASM compilation</q> [CVE-2023-4046], potential use after free issue [CVE-2023-37202], memory safety issues [CVE-2023-37211 CVE-2023-34416]">
+<correction mutt "New upstream stable release">
+<correction nco "Re-enable udunits2 support">
+<correction nftables "Fix incorrect bytecode generation hit with new kernel check that rejects adding rules to bound chains">
+<correction node-dottie "Security fix (prototype pollution) [CVE-2023-26132]">
+<correction nvidia-settings "New upstream bugfix release">
+<correction nvidia-settings-tesla "New upstream bugfix release">
+<correction nx-libs "Fix missing symlink /usr/share/nx/fonts; fix manpage">
+<correction open-ath9k-htc-firmware "Load correct firmware">
+<correction openbsd-inetd "Fix memory handling issues">
+<correction openrefine "Fix arbitrary code execution issue [CVE-2023-37476]">
+<correction openscap "Fix dependencies of openscap-utils and python3-openscap">
+<correction openssh "Fix remote code execution issue via a forwarded agent socket [CVE-2023-38408]">
+<correction openssl "New upstream stable release; security fixes [CVE-2023-2975 CVE-2023-3446 CVE-2023-3817]">
+<correction pam "Fix pam-auth-update --disable; update Turkish translation">
+<correction pandoc "Fix arbitrary file write issue [CVE-2023-35936]">
+<correction plasma-framework "Fix plasmashell crashes">
+<correction plasma-workspace "Fix crash in krunner">
+<correction python-git "Fix remote code execution issue [CVE-2023-40267], blind local file inclusion issue [CVE-2023-41040]">
+<correction pywinrm "Fix compatibility with Python 3.11">
+<correction qemu "Update to upstream 7.2.5 tree; ui/vnc-clipboard: fix infinite loop in inflate_buffer [CVE-2023-3255]; fix NULL pointer dereference issue [CVE-2023-3354]; fix buffer overflow issue [CVE-2023-3180]">
+<correction qtlocation-opensource-src "Fix freeze when loading map tiles">
+<correction rar "Upstream bugfix release [CVE-2023-40477]">
+<correction reprepro "Fix race condition when using external decompressors">
+<correction rmlint "Fix error in other packages caused by invalid python package version; fix GUI startup failure with recent python3.11">
+<correction roundcube "New upstream stable release; fix OAuth2 authentication; fix cross site scripting issues [CVE-2023-43770]">
+<correction runit-services "dhclient: don't hardcode use of eth1">
+<correction samba "New upstream stable release">
+<correction sitesummary "New upstream release; fix installation of sitesummary-maintenance CRON/systemd-timerd script; fix insecure temporary file and directory creation">
+<correction slbackup-php "Bug fixes: log remote commands to stderr; disable SSH known hosts files; PHP 8 compatibility">
+<correction spamprobe "Fix crashes parsing JPEG attachments">
+<correction stunnel4 "Fix handling of a peer closing TLS connection without proper shutdown messaging">
+<correction systemd "New upstream stable release; fix minor security issue in arm64 and riscv64 systemd-boot (EFI) with device tree blobs loading">
+<correction testng7 "Backport to stable for future openjdk-17 builds">
+<correction timg "Fix buffer overflow vulnerability [CVE-2023-40968]">
+<correction transmission "Replace openssl3 compat patch to fix memory leak">
+<correction unbound "Fix error log flooding when using DNS over TLS with openssl 3.0">
+<correction unrar-nonfree "Fix remote code execution issue [CVE-2023-40477]">
+<correction vorta "Handle ctime and mtime changes in diffs">
+<correction vte2.91 "Invalidate ring view more often when necessary, fixing various assertion failures during event handling">
+<correction x2goserver "x2goruncommand: add support for KDE Plasma 5; x2gostartagent: prevent logfile corruption; keystrokes.cfg: sync with nx-libs; fix encoding of Finnish translation">
+</table>
+
+
+<h2>تحديثات الأمان</h2>
+
+
+<p>
+أضافت هذه المراجعة تحديثات الأمان التالية للإصدار المستقر.
+سبق لفريق الأمان نشر تنبيه لكل تحديث:
+</p>
+
+<table border=0>
+<tr><th>معرَّف التنبيه</th> <th>الحزمة</th></tr>
+<dsa 2023 5454 kanboard>
+<dsa 2023 5455 iperf3>
+<dsa 2023 5456 chromium>
+<dsa 2023 5457 webkit2gtk>
+<dsa 2023 5458 openjdk-17>
+<dsa 2023 5459 amd64-microcode>
+<dsa 2023 5460 curl>
+<dsa 2023 5462 linux-signed-amd64>
+<dsa 2023 5462 linux-signed-arm64>
+<dsa 2023 5462 linux-signed-i386>
+<dsa 2023 5462 linux>
+<dsa 2023 5463 thunderbird>
+<dsa 2023 5464 firefox-esr>
+<dsa 2023 5465 python-django>
+<dsa 2023 5466 ntpsec>
+<dsa 2023 5467 chromium>
+<dsa 2023 5468 webkit2gtk>
+<dsa 2023 5469 thunderbird>
+<dsa 2023 5471 libhtmlcleaner-java>
+<dsa 2023 5472 cjose>
+<dsa 2023 5473 orthanc>
+<dsa 2023 5474 intel-microcode>
+<dsa 2023 5475 linux-signed-amd64>
+<dsa 2023 5475 linux-signed-arm64>
+<dsa 2023 5475 linux-signed-i386>
+<dsa 2023 5475 linux>
+<dsa 2023 5476 gst-plugins-ugly1.0>
+<dsa 2023 5477 samba>
+<dsa 2023 5479 chromium>
+<dsa 2023 5481 fastdds>
+<dsa 2023 5482 tryton-server>
+<dsa 2023 5483 chromium>
+<dsa 2023 5484 librsvg>
+<dsa 2023 5485 firefox-esr>
+<dsa 2023 5487 chromium>
+<dsa 2023 5488 thunderbird>
+<dsa 2023 5491 chromium>
+<dsa 2023 5492 linux-signed-amd64>
+<dsa 2023 5492 linux-signed-arm64>
+<dsa 2023 5492 linux-signed-i386>
+<dsa 2023 5492 linux>
+<dsa 2023 5493 open-vm-tools>
+<dsa 2023 5494 mutt>
+<dsa 2023 5495 frr>
+<dsa 2023 5496 firefox-esr>
+<dsa 2023 5497 libwebp>
+<dsa 2023 5498 thunderbird>
+<dsa 2023 5501 gnome-shell>
+<dsa 2023 5504 bind9>
+<dsa 2023 5505 lldpd>
+<dsa 2023 5507 jetty9>
+<dsa 2023 5510 libvpx>
+</table>
+
+
+<h2>الحزم المزالة</h2>
+
+<p>
+الحزم التالية أزيلت لأسباب خارجة عن سيطرتنا:
+</p>
+
+<table border=0>
+<tr><th>الحزمة</th> <th>السبب</th></tr>
+<correction https-everywhere "obsolete, major browsers offer native support">
+
+</table>
+
+<h2>مُثبِّت دبيان</h2>
+<p>
+حدِّث المُثبِّت ليتضمن الإصلاحات المندرجة في هذا الإصدار المستقر.
+</p>
+
+<h2>المسارات</h2>
+
+<p>
+القائمة الكاملة للحزم المغيّرة في هذه المراجعة:
+</p>
+
+<div class="center">
+ <url "https://deb.debian.org/debian/dists/<downcase <codename>>/ChangeLog">
+</div>
+
+<p>التوزيعة المستقرة الحالية:</p>
+
+<div class="center">
+ <url "https://deb.debian.org/debian/dists/stable/">
+</div>
+
+<p>التحديثات المقترحة للتوزيعة المستقرة:</p>
+
+<div class="center">
+ <url "https://deb.debian.org/debian/dists/proposed-updates">
+</div>
+
+<p>معلومات حول التوزيعة المستقرة (ملاحظات الإصدار والأخطاء إلخ):</p>
+
+<div class="center">
+ <a
+ href="$(HOME)/releases/stable/">https://www.debian.org/releases/stable/</a>
+</div>
+
+<p>معلومات وإعلانات الأمان:</p>
+
+<div class="center">
+ <a href="$(HOME)/security/">https://www.debian.org/security/</a>
+</div>
+
+<h2>حول دبيان</h2>
+
+<p>
+مشروع دبيان هو اتحاد لمطوري البرمجيات الحرة تطوعوا بالوقت والمجهود لإنتاج نظام تشعيل دبيان حر بالكامل.
+</p>
+
+<h2>معلومات الاتصال</h2>
+
+<p>
+لمزيد من المعلومات يرجى زيارة موقع دبيان
+<a href="$(HOME)/">https://www.debian.org/</a>
+أو إرسال بريد إلكتروني إلى &lt;press@debian.org&gt;
+أو الاتصال بفريق إصدار المستقرة على
+&lt;debian-release@lists.debian.org&gt;.
+</p>
+
+
+
diff --git a/arabic/News/2023/2023100702.wml b/arabic/News/2023/2023100702.wml
new file mode 100644
index 00000000000..9caab9716b1
--- /dev/null
+++ b/arabic/News/2023/2023100702.wml
@@ -0,0 +1,366 @@
+#use wml::debian::translation-check translation="7e9ce6b3f7065fbbce6287410a40acb00b516392"
+<define-tag pagetitle>تحديث دبيان 11: الإصدار 11.8</define-tag>
+<define-tag release_date>2023-10-07</define-tag>
+#use wml::debian::news
+
+<define-tag release>11</define-tag>
+<define-tag codename>bullseye</define-tag>
+<define-tag revision>11.8</define-tag>
+
+<define-tag dsa>
+ <tr><td align="center"><a href="$(HOME)/security/%0/dsa-%1">DSA-%1</a></td>
+ <td align="center"><:
+ my @p = ();
+ for my $p (split (/,\s*/, "%2")) {
+ push (@p, sprintf ('<a href="https://packages.debian.org/src:%s">%s</a>', $p, $p));
+ }
+ print join (", ", @p);
+:></td></tr>
+</define-tag>
+
+<define-tag correction>
+ <tr><td><a href="https://packages.debian.org/src:%0">%0</a></td> <td>%1</td></tr>
+</define-tag>
+
+<define-tag srcpkg><a href="https://packages.debian.org/src:%0">%0</a></define-tag>
+
+<p>
+يسعد مشروع دبيان الإعلان عن التحديث الثامن لتوزيعته المستقرة دبيان <release> (الاسم الرمزي <q><codename></q>).
+بالإضافة إلى تسوية بعض المشكلات الحرجة يصلح هذا التحديث بالأساس مشاكلات الأمان. تنبيهات الأمان أعلنت بشكل منفصل ومشار إليها فقط في هذا الإعلان.
+</p>
+
+<p>
+يرجى ملاحظة أن هذا التحديث لا يشكّل إصدار جديد لدبيان <release> بل فقط تحديثات لبعض الحزم المضمّنة
+وبالتالي ليس بالضرورة رمي الوسائط القديمة للإصدار <q><codename></q>، يمكن تحديث الحزم باستخدام مرآة دبيان محدّثة.
+</p>
+
+<p>
+الذين يثبّتون التحديثات من security.debian.org باستمرار لن يكون عليهم تحديث العديد من الحزم،
+أغلب التحديثات مضمّنة في هذا التحديث.
+</p>
+
+<p>
+صور جديدة لأقراص التثبيت ستكون متوفرة في موضعها المعتاد.
+</p>
+
+<p>
+يمكن الترقية من تثبيت آنيّ إلى هذه المراجعة بتوجيه نظام إدارة الحزم إلى إحدى مرايا HTTP الخاصة بدبيان.
+قائمة شاملة لمرايا دبيان على المسار:
+</p>
+
+<div class="center">
+ <a href="$(HOME)/mirror/list">https://www.debian.org/mirror/list</a>
+</div>
+
+
+
+
+<h2>إصلاح العديد من العلاّت</h2>
+
+<p>أضاف هذا التحديث للإصدار المستقر بعض الإصلاحات المهمة للحزم التالية:</p>
+
+<table border=0>
+<tr><th>الحزمة</th> <th>السبب</th></tr>
+<correction adduser "Fix command injection vulnerability in deluser">
+<correction aide "Fix handling of extended attributes on symlinks">
+<correction amd64-microcode "Update included microcode, including fixes for <q>AMD Inception</q> on AMD Zen4 processors [CVE-2023-20569]">
+<correction appstream-glib "Handle &lt;em&gt; and &lt;code&gt; tags in metadata">
+<correction asmtools "Backport to bullseye for future openjdk-11 builds">
+<correction autofs "Fix missing mutex unlock; do not use rpcbind for NFS4 mounts; fix regression determining reachability on dual-stack hosts">
+<correction base-files "Update for the 11.8 point release">
+<correction batik "Fix Server Side Request Forgery issues [CVE-2022-44729 CVE-2022-44730]">
+<correction bmake "Conflict with bsdowl (&lt;&lt; 2.2.2-1.2~) to ensure smooth upgrades">
+<correction boxer-data "Backport thunderbird compatibility fixes">
+<correction ca-certificates-java "Work around unconfigured jre during new installations">
+<correction cairosvg "Handle data: URLs in safe mode">
+<correction cargo-mozilla "New <q>upstream</q> version, to support building newer firefox-esr versions">
+<correction clamav "New upstream stable release; fix denial of service vulnerability via HFS+ parser [CVE-2023-20197]">
+<correction cpio "Fix arbitrary code execution issue [CVE-2021-38185]; replace Suggests: on libarchive1 with libarchive-dev">
+<correction cryptmount "Fix memory-initialization in command-line parser">
+<correction cups "Fix heap-based buffer overflow issues [CVE-2023-4504 CVE-2023-32324], unauthenticated access issue [CVE-2023-32360], use-after-free issue [CVE-2023-34241]">
+<correction curl "Fix code execution issues [CVE-2023-27533 CVE-2023-27534], information disclosure issues [CVE-2023-27535 CVE-2023-27536 CVE-2023-28322], inappropriate connection re-use issue [CVE-2023-27538], improper certificate validation issue [CVE-2023-28321]">
+<correction dbus "New upstream stable release; fix denial of service issue [CVE-2023-34969]">
+<correction debian-design "Rebuild using newer boxer-data">
+<correction debian-installer "Increase Linux kernel ABI to 5.10.0-26; rebuild against proposed-updates">
+<correction debian-installer-netboot-images "Rebuild against proposed-updates">
+<correction debian-parl "Rebuild using newer boxer-data">
+<correction debian-security-support "Set DEB_NEXT_VER_ID=12 as bookworm is the next release; security-support-limited: add gnupg1">
+<correction distro-info-data "Add Debian 14 <q>forky</q>; correct Ubuntu 23.04 release date; add Ubuntu 23.10 Mantic Minotaur; add the planned release date for Debian bookworm">
+<correction dkimpy "New upstream bugfix release">
+<correction dpdk "New upstream stable release">
+<correction dpkg "Add support for loong64 CPU; handle missing Version when formatting source:Upstream-Version; fix varbuf memory leak in pkg_source_version()">
+<correction flameshot "Disable uploads to imgur by default; fix name of d/NEWS file in previous upload">
+<correction ghostscript "Fix buffer overflow issue [CVE-2023-38559]; try and secure the IJS server startup [CVE-2023-43115]">
+<correction gitit "Rebuild against new pandoc">
+<correction grunt "Fix race condition in symlink copying [CVE-2022-1537]">
+<correction gss "Add Breaks+Replaces: libgss0 (&lt;&lt; 0.1)">
+<correction haskell-hakyll "Rebuild against new pandoc">
+<correction haskell-pandoc-citeproc "Rebuild against new pandoc">
+<correction hnswlib "Fix double free in init_index when the M argument is a large integer [CVE-2023-37365]">
+<correction horizon "Fix open redirect issue [CVE-2022-45582]">
+<correction inetutils "Check return values for set*id() functions, avoiding potential security issues [CVE-2023-40303]">
+<correction krb5 "Fix free of uninitialised pointer [CVE-2023-36054]">
+<correction kscreenlocker "Fix authentication error when using PAM">
+<correction lacme "Handle CA ready, processing and valid states correctly">
+<correction lapack "Fix eigenvector matrix">
+<correction lemonldap-ng "Fix open redirection when OIDC RP has no redirect URIs; fix Server Side Request Forgery issue [CVE-2023-44469]; fix open redirection due to incorrect escape handling">
+<correction libapache-mod-jk "Remove implicit mapping functionality, which could lead to unintended exposure of the status worker and/or bypass of security constraints [CVE-2023-41081]">
+<correction libbsd "Fix infinite loop in MD5File">
+<correction libclamunrar "New upstream stable release">
+<correction libprelude "Make Python module usable">
+<correction libreswan "Fix denial of service issue [CVE-2023-30570]">
+<correction libsignal-protocol-c "Fix integer overflow issue [CVE-2022-48468]">
+<correction linux "New upstream stable release">
+<correction linux-signed-amd64 "New upstream stable release">
+<correction linux-signed-arm64 "New upstream stable release">
+<correction linux-signed-i386 "New upstream stable release">
+<correction logrotate "Avoid replacement of /dev/null with a regular file if used for the state file">
+<correction ltsp "Avoid using <q>mv</q> on init symlink in order to work around overlayfs issue">
+<correction lttng-modules "Fix build issues with newer kernel versions">
+<correction lua5.3 "Fix use after free in lua_upvaluejoin (lapi.c) [CVE-2019-6706]; fix segmentation fault in getlocal and setlocal (ldebug.c) [CVE-2020-24370]">
+<correction mariadb-10.5 "New upstream bugfix release [CVE-2022-47015]">
+<correction mujs "Security fix">
+<correction ncurses "Disallow loading of custom terminfo entries in setuid/setgid programs [CVE-2023-29491]">
+<correction node-css-what "Fix regular expression-based denial of service issue [CVE-2022-21222 CVE-2021-33587]">
+<correction node-json5 "Fix prototype pollution issue [CVE-2022-46175]">
+<correction node-tough-cookie "Security fix: prototype pollution [CVE-2023-26136]">
+<correction nvidia-graphics-drivers "New upstream release [CVE-2023-25515 CVE-2023-25516]; improve compatibility with recent kernels">
+<correction nvidia-graphics-drivers-tesla-450 "New upstream release [CVE-2023-25515 CVE-2023-25516]">
+<correction nvidia-graphics-drivers-tesla-470 "New upstream bugfix release [CVE-2023-25515 CVE-2023-25516]">
+<correction openblas "Fix results of DGEMM on AVX512-capable hardware, when the package has been built on pre-AVX2 hardware">
+<correction openssh "Fix remote code execution issue via a forwarded agent socket [CVE-2023-38408]">
+<correction openssl "New upstream stable release; fix denial of service issues [CVE-2023-3446 CVE-2023-3817]">
+<correction org-mode "Fix command injection vulnerability [CVE-2023-28617]">
+<correction pandoc "Fix arbitrary file write issues [CVE-2023-35936 CVE-2023-38745]">
+<correction pev "Fix buffer overflow issue [CVE-2021-45423]">
+<correction php-guzzlehttp-psr7 "Fix improper input validation [CVE-2023-29197]">
+<correction php-nyholm-psr7 "Fix improper input validation issue [CVE-2023-29197]">
+<correction postgis "Fix axis order regression">
+<correction protobuf "Security fixes: DoS in Java [CVE-2021-22569]; NULL pointer dereference [CVE-2021-22570]; memory DoS [CVE-2022-1941]">
+<correction python2.7 "Fix <q>parameter cloaking</q> issue [CVE-2021-23336], URL injection issue [CVE-2022-0391], use-after-free issue [CVE-2022-48560], XML External Entity issue [CVE-2022-48565]; improve constant-time comparisons in compare_digest() [CVE-2022-48566]; improve URL parsing [CVE-2023-24329]; prevent reading unauthenticated data on an SSLSocket [CVE-2023-40217]">
+<correction qemu "Fix infinite loop [CVE-2020-14394], NULL pointer dereference issue [CVE-2021-20196], integer overflow issue [CVE-2021-20203], buffer overflow issues [CVE-2021-3507 CVE-2023-3180], denial of service issues [CVE-2021-3930 CVE-2023-3301], use-after-free issue [CVE-2022-0216], possible stack overflow and use-after-free issues [CVE-2023-0330], out-of-bounds read issue [CVE-2023-1544]">
+<correction rar "New upstream release; fix directory traversal issue [CVE-2022-30333]; fix arbitrary code execution issue [CVE-2023-40477]">
+<correction rhonabwy "Fix aesgcm buffer overflow [CVE-2022-32096]">
+<correction roundcube "New upstream stable release; fix cross-site scripting issue [CVE-2023-43770]; Enigma: Fix initial synchronization of private keys">
+<correction rust-cbindgen "New <q>upstream</q> version, to support building newer firefox-esr versions">
+<correction rustc-mozilla "New <q>upstream</q> version, to support building newer firefox-esr versions">
+<correction schleuder "Add versioned dependency on ruby-activerecord">
+<correction sgt-puzzles "Fix various security issues in game loading [CVE-2023-24283 CVE-2023-24284 CVE-2023-24285 CVE-2023-24287 CVE-2023-24288 CVE-2023-24291]">
+<correction spip "Several security fixes; security fix for extended authentification data filtering">
+<correction spyder "Fix broken patch in previous update">
+<correction systemd "Udev: fix creating /dev/serial/by-id/ symlinks for USB devices; fix memory leak on daemon-reload; fix a calendar spec calculation hang on DST change if TZ=Europe/Dublin">
+<correction tang "Fix race condition when creating/rotating keys; assert restrictive permissions on key directory [CVE-2023-1672]; make tangd-rotate-keys executable">
+<correction testng7 "Backport to oldstable for future openjdk-17 builds">
+<correction tinyssh "Work around incoming packets which don't honour max packet length">
+<correction unrar-nonfree "Fix file overwrite issue [CVE-2022-48579]; fix remote code execution issue [CVE-2023-40477]">
+<correction xen "New upstream stable release; fix security issues [CVE-2023-20593 CVE-2023-20569 CVE-2022-40982]">
+<correction yajl "Memory leak security fix; security fixes: potential denial of service with crafted JSON file [CVE-2017-16516]; heap memory corruption when dealing with large (~2GB) inputs [CVE-2022-24795]; fix incomplete patch for CVE-2023-33460">
+</table>
+
+
+<h2>تحديثات الأمان</h2>
+
+
+<p>
+أضافت هذه المراجعة تحديثات الأمان التالية للإصدار المستقر.
+سبق لفريق الأمان نشر تنبيه لكل تحديث:
+</p>
+
+<table border=0>
+<tr><th>معرَّف التنبيه</th> <th>الحزمة</th></tr>
+<dsa 2023 5394 ffmpeg>
+<dsa 2023 5395 nodejs>
+<dsa 2023 5396 evolution>
+<dsa 2023 5396 webkit2gtk>
+<dsa 2023 5397 wpewebkit>
+<dsa 2023 5398 chromium>
+<dsa 2023 5399 odoo>
+<dsa 2023 5400 firefox-esr>
+<dsa 2023 5401 postgresql-13>
+<dsa 2023 5402 linux-signed-amd64>
+<dsa 2023 5402 linux-signed-arm64>
+<dsa 2023 5402 linux-signed-i386>
+<dsa 2023 5402 linux>
+<dsa 2023 5403 thunderbird>
+<dsa 2023 5404 chromium>
+<dsa 2023 5405 libapache2-mod-auth-openidc>
+<dsa 2023 5406 texlive-bin>
+<dsa 2023 5407 cups-filters>
+<dsa 2023 5408 libwebp>
+<dsa 2023 5409 libssh>
+<dsa 2023 5410 sofia-sip>
+<dsa 2023 5411 gpac>
+<dsa 2023 5412 libraw>
+<dsa 2023 5413 sniproxy>
+<dsa 2023 5414 docker-registry>
+<dsa 2023 5415 libreoffice>
+<dsa 2023 5416 connman>
+<dsa 2023 5417 openssl>
+<dsa 2023 5418 chromium>
+<dsa 2023 5419 c-ares>
+<dsa 2023 5420 chromium>
+<dsa 2023 5421 firefox-esr>
+<dsa 2023 5422 jupyter-core>
+<dsa 2023 5423 thunderbird>
+<dsa 2023 5424 php7.4>
+<dsa 2023 5426 owslib>
+<dsa 2023 5427 webkit2gtk>
+<dsa 2023 5428 chromium>
+<dsa 2023 5430 openjdk-17>
+<dsa 2023 5431 sofia-sip>
+<dsa 2023 5432 xmltooling>
+<dsa 2023 5433 libx11>
+<dsa 2023 5434 minidlna>
+<dsa 2023 5435 trafficserver>
+<dsa 2023 5436 hsqldb1.8.0>
+<dsa 2023 5437 hsqldb>
+<dsa 2023 5438 asterisk>
+<dsa 2023 5439 bind9>
+<dsa 2023 5440 chromium>
+<dsa 2023 5441 maradns>
+<dsa 2023 5442 flask>
+<dsa 2023 5443 gst-plugins-base1.0>
+<dsa 2023 5444 gst-plugins-bad1.0>
+<dsa 2023 5445 gst-plugins-good1.0>
+<dsa 2023 5446 ghostscript>
+<dsa 2023 5447 mediawiki>
+<dsa 2023 5449 webkit2gtk>
+<dsa 2023 5450 firefox-esr>
+<dsa 2023 5451 thunderbird>
+<dsa 2023 5452 gpac>
+<dsa 2023 5453 linux-signed-amd64>
+<dsa 2023 5453 linux-signed-arm64>
+<dsa 2023 5453 linux-signed-i386>
+<dsa 2023 5453 linux>
+<dsa 2023 5455 iperf3>
+<dsa 2023 5456 chromium>
+<dsa 2023 5457 webkit2gtk>
+<dsa 2023 5459 amd64-microcode>
+<dsa 2023 5461 linux-signed-amd64>
+<dsa 2023 5461 linux-signed-arm64>
+<dsa 2023 5461 linux-signed-i386>
+<dsa 2023 5461 linux>
+<dsa 2023 5463 thunderbird>
+<dsa 2023 5464 firefox-esr>
+<dsa 2023 5465 python-django>
+<dsa 2023 5467 chromium>
+<dsa 2023 5468 webkit2gtk>
+<dsa 2023 5470 python-werkzeug>
+<dsa 2023 5471 libhtmlcleaner-java>
+<dsa 2023 5472 cjose>
+<dsa 2023 5473 orthanc>
+<dsa 2023 5474 intel-microcode>
+<dsa 2023 5475 linux-signed-amd64>
+<dsa 2023 5475 linux-signed-arm64>
+<dsa 2023 5475 linux-signed-i386>
+<dsa 2023 5475 linux>
+<dsa 2023 5476 gst-plugins-ugly1.0>
+<dsa 2023 5478 openjdk-11>
+<dsa 2023 5479 chromium>
+<dsa 2023 5480 linux-signed-amd64>
+<dsa 2023 5480 linux-signed-arm64>
+<dsa 2023 5480 linux-signed-i386>
+<dsa 2023 5480 linux>
+<dsa 2023 5481 fastdds>
+<dsa 2023 5482 tryton-server>
+<dsa 2023 5483 chromium>
+<dsa 2023 5484 librsvg>
+<dsa 2023 5485 firefox-esr>
+<dsa 2023 5486 json-c>
+<dsa 2023 5487 chromium>
+<dsa 2023 5489 file>
+<dsa 2023 5490 aom>
+<dsa 2023 5491 chromium>
+<dsa 2023 5493 open-vm-tools>
+<dsa 2023 5494 mutt>
+<dsa 2023 5495 frr>
+<dsa 2023 5497 libwebp>
+<dsa 2023 5500 flac>
+<dsa 2023 5502 xorgxrdp>
+<dsa 2023 5502 xrdp>
+<dsa 2023 5503 netatalk>
+<dsa 2023 5504 bind9>
+<dsa 2023 5505 lldpd>
+<dsa 2023 5507 jetty9>
+<dsa 2023 5510 libvpx>
+</table>
+
+
+<h2>الحزم المزالة</h2>
+
+<p>
+الحزم التالية أزيلت لأسباب خارجة عن سيطرتنا:
+</p>
+
+<table border=0>
+<tr><th>الحزمة</th> <th>السبب</th></tr>
+<correction atlas-cpp "unstable upstream, unsuitable for Debian">
+<correction ember-media "unstable upstream, unsuitable for Debian">
+<correction eris "unstable upstream, unsuitable for Debian">
+<correction libwfut "unstable upstream, unsuitable for Debian">
+<correction mercator "unstable upstream, unsuitable for Debian">
+<correction nomad "security fixes no longer available">
+<correction nomad-driver-lxc "depends on to-be-removed nomad">
+<correction skstream "unstable upstream, unsuitable for Debian">
+<correction varconf "unstable upstream, unsuitable for Debian">
+<correction wfmath "unstable upstream, unsuitable for Debian">
+
+</table>
+
+<h2>مُثبِّت دبيان</h2>
+<p>
+حدِّث المُثبِّت ليتضمن الإصلاحات المندرجة في هذا الإصدار المستقر.
+</p>
+
+<h2>المسارات</h2>
+
+<p>
+القائمة الكاملة للحزم المغيّرة في هذه المراجعة:
+</p>
+
+<div class="center">
+ <url "https://deb.debian.org/debian/dists/<downcase <codename>>/ChangeLog">
+</div>
+
+<p>التوزيعة المستقرة الحالية:</p>
+
+<div class="center">
+ <url "https://deb.debian.org/debian/dists/stable/">
+</div>
+
+<p>التحديثات المقترحة للتوزيعة المستقرة:</p>
+
+<div class="center">
+ <url "https://deb.debian.org/debian/dists/proposed-updates">
+</div>
+
+<p>معلومات حول التوزيعة المستقرة (ملاحظات الإصدار والأخطاء إلخ):</p>
+
+<div class="center">
+ <a
+ href="$(HOME)/releases/stable/">https://www.debian.org/releases/stable/</a>
+</div>
+
+<p>معلومات وإعلانات الأمان:</p>
+
+<div class="center">
+ <a href="$(HOME)/security/">https://www.debian.org/security/</a>
+</div>
+
+<h2>حول دبيان</h2>
+
+<p>
+مشروع دبيان هو اتحاد لمطوري البرمجيات الحرة تطوعوا بالوقت والمجهود لإنتاج نظام تشعيل دبيان حر بالكامل.
+</p>
+
+<h2>معلومات الاتصال</h2>
+
+<p>
+لمزيد من المعلومات يرجى زيارة موقع دبيان
+<a href="$(HOME)/">https://www.debian.org/</a>
+أو إرسال بريد إلكتروني إلى &lt;press@debian.org&gt;
+أو الاتصال بفريق إصدار المستقرة على
+&lt;debian-release@lists.debian.org&gt;.
+</p>
+
+

© 2014-2024 Faster IT GmbH | imprint | privacy policy