diff options
author | Luca Monducci <luca.mo@tiscali.it> | 2021-10-10 14:23:01 +0200 |
---|---|---|
committer | Luca Monducci <luca.mo@tiscali.it> | 2021-10-10 14:23:01 +0200 |
commit | 018d1dce18b3d246e256af1d3ff586939e1125a8 (patch) | |
tree | 840a8435088837605ee29ad6d7e8c4fa1bc6be4f /italian/News | |
parent | e32dce61f078a2a393f15dae4a13b342160d1b9f (diff) |
(it) releases 10.11 11.1 fix typo
Diffstat (limited to 'italian/News')
-rw-r--r-- | italian/News/2021/20210619.wml | 2 | ||||
-rw-r--r-- | italian/News/2021/20211009.wml | 253 | ||||
-rw-r--r-- | italian/News/2021/2021100902.wml | 242 |
3 files changed, 496 insertions, 1 deletions
diff --git a/italian/News/2021/20210619.wml b/italian/News/2021/20210619.wml index b5b8f9c4a2c..7fba9ba24ab 100644 --- a/italian/News/2021/20210619.wml +++ b/italian/News/2021/20210619.wml @@ -29,7 +29,7 @@ sua distribuzione stabile Debian <release> (codice <q><codename></q>). Questo rilascio minore aggiunge principalmente correzioni e risoluzioni di problemi di sicurezza, oltre che pochi aggiustamenti per problemi seri. -Gli annunci della sicurezza sono già stati pubblicati separamente e sono +Gli annunci della sicurezza sono già stati pubblicati separatamente e sono qui elencati quando disponibili.</p> <p>Questo aggiornamento minore non costituisce una nuova versione di Debian diff --git a/italian/News/2021/20211009.wml b/italian/News/2021/20211009.wml new file mode 100644 index 00000000000..d2a3eb836e8 --- /dev/null +++ b/italian/News/2021/20211009.wml @@ -0,0 +1,253 @@ +<define-tag pagetitle>Aggiornamento Debian 11: rilasciato 11.1</define-tag> +<define-tag release_date>2021-10-09</define-tag> +#use wml::debian::news +#use wml::debian::translation-check translation="d9e5cd3d7df23feb17458b95c465e062e9cd6e5a" + +<define-tag release>11</define-tag> +<define-tag codename>bullseye</define-tag> +<define-tag revision>11.1</define-tag> + +<define-tag dsa> + <tr><td align="center"><a href="$(HOME)/security/%0/dsa-%1">DSA-%1</a></td> + <td align="center"><: + my @p = (); + for my $p (split (/,\s*/, "%2")) { + push (@p, sprintf ('<a href="https://packages.debian.org/src:%s">%s</a>', $p, $p)); + } + print join (", ", @p); +:></td></tr> +</define-tag> + +<define-tag correction> + <tr><td><a href="https://packages.debian.org/src:%0">%0</a></td> <td>%1</td></tr> +</define-tag> + +<define-tag srcpkg><a href="https://packages.debian.org/src:%0">%0</a></define-tag> + +<p>Il progetto Debian è felice di annunciare il primo aggiornamento della +sua distribuzione stable Debian <release> (codice <q><codename></q>). +Questo rilascio minore aggiunge principalmente correzioni e risoluzioni +di problemi di sicurezza, oltre che pochi aggiustamenti per problemi seri. +Gli annunci della sicurezza sono già stati pubblicati separatamente e sono +qui elencati quando disponibili.</p> + +<p>Questo aggiornamento minore non costituisce una nuova versione di Debian +<release> ma ne aggiorna solamente alcuni pacchetti. Non è necessario buttare +via il vecchio supporto di <q><codename></q>: dopo l'installazione i pacchetti +potranno essere aggiornati all'ultima versione usando un mirror aggiornato.</p> + +<p>Quelli che installano frequentemente gli aggiornamenti da security.debian.org +non dovranno aggiornare molti pacchetti, e molti di questi aggiornamenti sono +inclusi anche nel rilascio minore.</p> + +<p>Nuove immagini per l'installazione verranno presto rese disponibili +al solito indirizzo.</p> + +<p>Per aggiornare una installazione esistente a questa revisione è +sufficiente usare il sistema di gestione dei pacchetti e uno dei tanti mirror +HTTP Debian. Un elenco completo dei mirror è disponibile qui:</p> + +<div class="center"> + <a href="$(HOME)/mirror/list">https://www.debian.org/mirror/list</a> +</div> + + + + +<h2>Aggiornamenti vari</h2> + +<p>Questo aggiornamento alla versione stable aggiungere alcune importanti correzioni ai seguenti pacchetti:</p> + +<table border=0> +<tr><th>Pacchetto</th> <th>Motivo</th></tr> +<correction apr "Prevent out-of-bounds array dereference"> +<correction atftp "Fix buffer overflow [CVE-2021-41054]"> +<correction automysqlbackup "Fix crash when using <q>LATEST=yes</q>"> +<correction base-files "Update for the 11.1 point release"> +<correction clamav "New upstream stable release; fix clamdscan segfaults when --fdpass and --multipass are used together with ExcludePath"> +<correction cloud-init "Avoid duplicate includedir in /etc/sudoers"> +<correction cyrus-imapd "Fix denial-of-service issue [CVE-2021-33582]"> +<correction dazzdb "Fix a use-after-free in DBstats"> +<correction debian-edu-config "debian-edu-ltsp-install: extend main server related exclude list; add slapd and xrdp-sesman to the list of masked services"> +<correction debian-installer "Rebuild against proposed updates; update Linux ABI to 5.10.0-9; use udebs from proposed-updates"> +<correction debian-installer-netboot-images "Rebuild against proposed-updates; use udebs from proposed-updates and stable; use xz-compressed Packages files"> +<correction detox "Fix handling of large files"> +<correction devscripts "Make the --bpo option target bullseye-backports"> +<correction dlt-viewer "Add missing qdlt/qdlt*.h header files to dev package"> +<correction dpdk "New upstream stable release"> +<correction fetchmail "Fix segmentation fault and security regression"> +<correction flatpak "New upstream stable release; don't inherit an unusual $XDG_RUNTIME_DIR setting into the sandbox"> +<correction freeradius "Fix thread crash and sample configuration"> +<correction galera-3 "New upstream stable release"> +<correction galera-4 "New upstream stable release; solve circular Conflicts with galera-3 by no longer providing a virtual <q>galera</q> package"> +<correction glewlwyd "Fix possible buffer overflow during FIDO2 signature validation in webauthn registration [CVE-2021-40818]"> +<correction glibc "Restart openssh-server even if it has been deconfigured during the upgrade; fix text fallback when debconf is unusable"> +<correction gnome-maps "New upstream stable release; fix a crash when starting up with last-used map type being aerial, and no aerial tile definition is found; don't sometimes write broken last view position on exit; fix hang when dragging around route markers"> +<correction gnome-shell "New upstream stable release; fix freeze after cancelling (some) system-modal dialogs; fix word suggestions in on-screen keyboard; fix crashes"> +<correction hdf5 "Adjust package dependencies to improve upgrade paths from older releases"> +<correction iotop-c "Properly handle UTF-8 process names"> +<correction jailkit "Fix creation of jails that need to use /dev; fix library presence check"> +<correction java-atk-wrapper "Also use dbus to detect accessibility being enabled"> +<correction krb5 "Fix KDC null dereference crash on FAST request with no server field [CVE-2021-37750]; fix memory leak in krb5_gss_inquire_cred"> +<correction libavif "Use correct libdir in libavif.pc pkgconfig file"> +<correction libbluray "Switch to embedded libasm; the version from libasm-java is too new"> +<correction libdatetime-timezone-perl "New upstream stable release; update DST rules for Samoa and Jordon; confirmation of no leap second on 2021-12-31"> +<correction libslirp "Fix multiple buffer overflow issues [CVE-2021-3592 CVE-2021-3593 CVE-2021-3594 CVE-2021-3595]"> +<correction linux "New upstream stable release; increase ABI to 9; [rt] Update to 5.10.65-rt53; [mipsel] bpf, mips: Validate conditional branch offsets [CVE-2021-38300]"> +<correction linux-signed-amd64 "New upstream stable release; increase ABI to 9; [rt] Update to 5.10.65-rt53; [mipsel] bpf, mips: Validate conditional branch offsets [CVE-2021-38300]"> +<correction linux-signed-arm64 "New upstream stable release; increase ABI to 9; [rt] Update to 5.10.65-rt53; [mipsel] bpf, mips: Validate conditional branch offsets [CVE-2021-38300]"> +<correction linux-signed-i386 "New upstream stable release; increase ABI to 9; [rt] Update to 5.10.65-rt53; [mipsel] bpf, mips: Validate conditional branch offsets [CVE-2021-38300]"> +<correction mariadb-10.5 "New upstream stable release; security fixes [CVE-2021-2372 CVE-2021-2389]"> +<correction mbrola "Fix end of file detection"> +<correction modsecurity-crs "Fix request body bypass issue [CVE-2021-35368]"> +<correction mtr "Fix regression in JSON output"> +<correction mutter "New upstream stable release; kms: Improve handling of common video modes that might exceed the possible bandwidth; ensure valid window texture size after viewport changes"> +<correction nautilus "Avoid opening multiple selected files in multiple application instances; don't save window size and position when tiled; fix some memory leaks; update translations"> +<correction node-ansi-regex "Fix regular expression-based denial of service issue [CVE-2021-3807]"> +<correction node-axios "Fix regular expression-based denial of service issue [CVE-2021-3749]"> +<correction node-object-path "Fix prototype pollution issues [CVE-2021-23434 CVE-2021-3805]"> +<correction node-prismjs "Fix regular expression-based denial of service issue [CVE-2021-3801]"> +<correction node-set-value "Fix prototype pollution [CVE-2021-23440]"> +<correction node-tar "Remove non-directory paths from the directory cache [CVE-2021-32803]; strip absolute paths more comprehensively [CVE-2021-32804]"> +<correction osmcoastline "Fix projections other than WGS84"> +<correction osmpbf "Rebuild against protobuf 3.12.4"> +<correction pam "Fix syntax error in libpam0g.postinst when a systemd unit fails"> +<correction perl "Security update; fix a regular expression memory leak"> +<correction pglogical "Update for PostgreSQL 13.4 snapshot handling fixes"> +<correction pmdk "Fix missing barriers after non-temporal memcpy"> +<correction postgresql-13 "New upstream stable release; fix mis-planning of repeated application of a projection step [CVE-2021-3677]; disallow SSL renegotiation more completely"> +<correction proftpd-dfsg "Fix <q>mod_radius leaks memory contents to radius server</q> and <q>sftp connection aborts with </q>Corrupted MAC on input""; skip escaping of already-escaped SQL text"> +<correction pyx3 "Fix horizontal font alignment issue with texlive 2020"> +<correction reportbug "Update suite names following bullseye release"> +<correction request-tracker4 "Fix login timing side-channel attack issue [CVE-2021-38562]"> +<correction rhonabwy "Fix JWE CBC tag computation and JWS alg:none signature verification"> +<correction rpki-trust-anchors "Add HTTPS URL to the LACNIC TAL"> +<correction rsync "Re-add --copy-devices; fix regression in --delay-updates; fix edge case in --mkpath; fix rsync-ssl; fix --sparce and --inplace; update options available to rrsync; documentation fixes"> +<correction ruby-rqrcode-rails3 "Fix for ruby-rqrcode 1.0 compatibility"> +<correction sabnzbdplus "Prevent directory escape in renamer function [CVE-2021-29488]"> +<correction shellcheck "Fix rendering of long options in manpage"> +<correction shiro "Fix authentication bypass issues [CVE-2020-1957 CVE-2020-11989 CVE-2020-13933 CVE-2020-17510]; update Spring Framework compatibility patch; support Guice 4"> +<correction speech-dispatcher "Fix setting of voice name for the generic module"> +<correction telegram-desktop "Avoid crash when auto-delete is enabled"> +<correction termshark "Include themes in package"> +<correction tmux "Fix a race condition which results in the config not being loaded if several clients are interacting with the server while it's initializing"> +<correction txt2man "Fix regression in handling display blocks"> +<correction tzdata "Update DST rules for Samoa and Jordan; confirm the absence of a leap second on 2021-12-31"> +<correction ublock-origin "New upstream stable release; fix denial of service issue [CVE-2021-36773]"> +<correction ulfius "Ensure memory is initialised before use [CVE-2021-40540]"> +</table> + + +<h2>Aggiornamenti della sicurezza</h2> + +<p>Questa versione include i seguenti aggiornamenti della sicurezza al rilascio stable. +Il gruppo della sicurezza ha già rilasciato un avviso per ciascuno di essi:</p> + +<table border=0> +<tr><th>ID avviso</th> <th>Pacchetto</th></tr> +<dsa 2021 4959 thunderbird> +<dsa 2021 4960 haproxy> +<dsa 2021 4961 tor> +<dsa 2021 4962 ledgersmb> +<dsa 2021 4963 openssl> +<dsa 2021 4964 grilo> +<dsa 2021 4965 libssh> +<dsa 2021 4966 gpac> +<dsa 2021 4967 squashfs-tools> +<dsa 2021 4968 haproxy> +<dsa 2021 4969 firefox-esr> +<dsa 2021 4970 postorius> +<dsa 2021 4971 ntfs-3g> +<dsa 2021 4972 ghostscript> +<dsa 2021 4973 thunderbird> +<dsa 2021 4974 nextcloud-desktop> +<dsa 2021 4975 webkit2gtk> +<dsa 2021 4976 wpewebkit> +<dsa 2021 4977 xen> +<dsa 2021 4978 linux-signed-amd64> +<dsa 2021 4978 linux-signed-arm64> +<dsa 2021 4978 linux-signed-i386> +<dsa 2021 4978 linux> +<dsa 2021 4979 mediawiki> +</table> + + +<!-- +<h2>Pacchetti rimossi</h2> + +<p>I seguenti pacchetti sono stati rimossi per motivi esterni alla nostra volontà:</p> +--> + +<p> +Nella parte finale della fase di freeze di bullseye alcuni aggiornamenti +sono stati rilasciati tramite <a href="https://security.debian.org/">l'archivio +di sicurezza</a> ma senza il DSA di accompagnamento. Questi aggiornamenti +sono riportati di seguito. +</p> + +<table border=0> +<tr><th>Pacchetto</th> <th>Motivo</th></tr> +<correction apache2 "Fix mod_proxy HTTP2 request line injection [CVE-2021-33193]"> +<correction btrbk "Fix arbitrary code execution issue [CVE-2021-38173]"> +<correction c-ares "Fix missing input validation on hostnames returned by DNS servers [CVE-2021-3672]"> +<correction exiv2 "Fix overflow issues [CVE-2021-29457 CVE-2021-31292]"> +<correction firefox-esr "New upstream stable release [CVE-2021-29980 CVE-2021-29984 CVE-2021-29985 CVE-2021-29986 CVE-2021-29988 CVE-2021-29989]"> +<correction libencode-perl "Encode: mitigate @INC pollution when loading ConfigLocal [CVE-2021-36770]"> +<correction libspf2 "spf_compile.c: Correct size of ds_avail [CVE-2021-20314]; fix <q>reverse</q> macro modifier"> +<correction lynx "Fix leakage of credentials if SNI was used together with a URL containing credentials [CVE-2021-38165]"> +<correction nodejs "New upstream stable release; fix use after free issue [CVE-2021-22930]"> +<correction tomcat9 "Fix authentication bypass issue [CVE-2021-30640] and request smuggling issue [CVE-2021-33037]"> +<correction xmlgraphics-commons "Fix server side request forgery issue [CVE-2020-11988]"> +</table> + + +<h2>Procedura di installazione di Debian</h2> + +<p>La procedura di installazione è stata aggiornata per includere gli +aggiornamenti presenti in questo rilascio minore.</p> + +<h2>URL</h2> + +<p>L'elenco completo dei pacchetti che sono cambiati con questa revisione:</p> + +<div class="center"> + <url "https://deb.debian.org/debian/dists/<downcase <codename>>/ChangeLog"> +</div> + +<p>La attuale distribuzione stable:</p> + +<div class="center"> + <url "https://deb.debian.org/debian/dists/stable/"> +</div> + +<p>Aggiornamenti proposti per la distribuzione stable:</p> + +<div class="center"> + <url "https://deb.debian.org/debian/dists/proposed-updates"> +</div> + +<p>Informazioni sulla distribuzione stable (note di rilascio, errata, etc.):</p> + +<div class="center"> + <a + href="$(HOME)/releases/stable/">https://www.debian.org/releases/stable/</a> +</div> + +<p>Annunci e informazioni sulla sicurezza:</p> + +<div class="center"> + <a href="$(HOME)/security/">https://www.debian.org/security/</a> +</div> + +<h2>Su Debian</h2> + +<p>Il progetto Debian è una associazione di sviluppatori di software +libero che offrono volontariamente il loro tempo e il loro lavoro per +produrre il sistema operativo totalmente libero Debian.</p> + +<h2>Contatti</h2> + +<p>Per maggiori informazioni, visitare le pagine web del sito Debian +<a href="$(HOME)/">https://www.debian.org/</a>, inviare email a +<press@debian.org> o contattare il gruppo del rilascio stabile a +<debian-release@lists.debian.org>.</p> diff --git a/italian/News/2021/2021100902.wml b/italian/News/2021/2021100902.wml new file mode 100644 index 00000000000..9d6989fa939 --- /dev/null +++ b/italian/News/2021/2021100902.wml @@ -0,0 +1,242 @@ +<define-tag pagetitle>Aggiornamento Debian 10: rilasciato 10.11</define-tag> +<define-tag release_date>2021-10-09</define-tag> +#use wml::debian::news +#use wml::debian::translation-check translation="d9e5cd3d7df23feb17458b95c465e062e9cd6e5a" + +<define-tag release>10</define-tag> +<define-tag codename>buster</define-tag> +<define-tag revision>10.11</define-tag> + +<define-tag dsa> + <tr><td align="center"><a href="$(HOME)/security/%0/dsa-%1">DSA-%1</a></td> + <td align="center"><: + my @p = (); + for my $p (split (/,\s*/, "%2")) { + push (@p, sprintf ('<a href="https://packages.debian.org/src:%s">%s</a>', $p, $p)); + } + print join (", ", @p); +:></td></tr> +</define-tag> + +<define-tag correction> + <tr><td><a href="https://packages.debian.org/src:%0">%0</a></td> <td>%1</td></tr> +</define-tag> + +<define-tag srcpkg><a href="https://packages.debian.org/src:%0">%0</a></define-tag> + +<p>Il progetto Debian è felice di annunciare l'undicesimo aggiornamento della +sua distribuzione oldstable Debian <release> (codice <q><codename></q>). +Questo rilascio minore aggiunge principalmente correzioni e risoluzioni +di problemi di sicurezza, oltre che pochi aggiustamenti per problemi seri. +Gli annunci della sicurezza sono già stati pubblicati separatamente e sono +qui elencati quando disponibili.</p> + +<p>Questo aggiornamento minore non costituisce una nuova versione di Debian +<release> ma ne aggiorna solamente alcuni pacchetti. Non è necessario buttare +via il vecchio supporto di <q><codename></q>: dopo l'installazione i pacchetti +potranno essere aggiornati all'ultima versione usando un mirror aggiornato.</p> + +<p>Quelli che installano frequentemente gli aggiornamenti da security.debian.org +non dovranno aggiornare molti pacchetti, e molti di questi aggiornamenti sono +inclusi anche nel rilascio minore.</p> + +<p>Nuove immagini per l'installazione verranno presto rese disponibili +al solito indirizzo.</p> + +<p>Per aggiornare una installazione esistente a questa revisione è +sufficiente usare il sistema di gestione dei pacchetti e uno dei tanti mirror +HTTP Debian. Un elenco completo dei mirror è disponibile qui:</p> + +<div class="center"> + <a href="$(HOME)/mirror/list">https://www.debian.org/mirror/list</a> +</div> + + + + +<h2>Aggiornamenti vari</h2> + +<p>Questo aggiornamento alla versione oldstable aggiungere alcune importanti correzioni ai seguenti pacchetti:</p> + +<table border=0> +<tr><th>Pacchetto</th> <th>Motivo</th></tr> +<correction atftp "Fix buffer overflow [CVE-2021-41054]"> +<correction base-files "Update for the 10.11 point release"> +<correction btrbk "Fix arbitrary code execution issue [CVE-2021-38173]"> +<correction clamav "New upstream stable release; fix clamdscan segfaults when --fdpass and --multipass are used together with ExcludePath"> +<correction commons-io "Fix path traversal issue [CVE-2021-29425]"> +<correction cyrus-imapd "Fix denial-of-service issue [CVE-2021-33582]"> +<correction debconf "Check that whiptail or dialog is actually usable"> +<correction debian-installer "Rebuild against buster-proposed-updates; update Linux ABI to 4.19.0-18"> +<correction debian-installer-netboot-images "Rebuild against buster-proposed-updates"> +<correction distcc "Fix GCC cross-compiler links in update-distcc-symlinks and add support for clang and CUDA (nvcc)"> +<correction distro-info-data "Update included data for several releases"> +<correction dwarf-fortress "Remove undistributable prebuilt shared libraries from the source tarball"> +<correction espeak-ng "Fix using espeak with mbrola-fr4 when mbrola-fr1 is not installed"> +<correction gcc-mingw-w64 "Fix gcov handling"> +<correction gthumb "Fix heap-based buffer overflow issue [CVE-2019-20326]"> +<correction hg-git "Fix test failures with recent git versions"> +<correction htslib "Fix autopkgtest on i386"> +<correction http-parser "Fix HTTP request smuggling issue [CVE-2019-15605]"> +<correction irssi "Fix use after free issue when sending SASL login to the server [CVE-2019-13045]"> +<correction java-atk-wrapper "Also use dbus to detect accessibility being enabled"> +<correction krb5 "Fix KDC null dereference crash on FAST request with no server field [CVE-2021-37750]; fix memory leak in krb5_gss_inquire_cred"> +<correction libdatetime-timezone-perl "New upstream stable release; update DST rules for Samoa and Jordon; confirmation of no leap second on 2021-12-31"> +<correction libpam-tacplus "Prevent shared secrets from being added in plaintext to the system log [CVE-2020-13881]"> +<correction linux "<q>proc: Track /proc/$pid/attr/ opener mm_struct</q>, fixing issues with lxc-attach; new upstream stable release; increase ABI version to 18; [rt] Update to 4.19.207-rt88; usb: hso: fix error handling code of hso_create_net_device [CVE-2021-37159]"> +<correction linux-latest "Update to 4.19.0-18 kernel ABI"> +<correction linux-signed-amd64 "<q>proc: Track /proc/$pid/attr/ opener mm_struct</q>, fixing issues with lxc-attach; new upstream stable release; increase ABI version to 18; [rt] Update to 4.19.207-rt88; usb: hso: fix error handling code of hso_create_net_device [CVE-2021-37159]"> +<correction linux-signed-arm64 "<q>proc: Track /proc/$pid/attr/ opener mm_struct</q>, fixing issues with lxc-attach; new upstream stable release; increase ABI version to 18; [rt] Update to 4.19.207-rt88; usb: hso: fix error handling code of hso_create_net_device [CVE-2021-37159]"> +<correction linux-signed-i386 "<q>proc: Track /proc/$pid/attr/ opener mm_struct</q>, fixing issues with lxc-attach; new upstream stable release; increase ABI version to 18; [rt] Update to 4.19.207-rt88; usb: hso: fix error handling code of hso_create_net_device [CVE-2021-37159]"> +<correction mariadb-10.3 "New upstream stable release; security fixes [CVE-2021-2389 CVE-2021-2372]; fix Perl executable path in scripts"> +<correction modsecurity-crs "Fix request body bypass issue [CVE-2021-35368]"> +<correction node-ansi-regex "Fix regular expression-based denial of service issue [CVE-2021-3807]"> +<correction node-axios "Fix regular expression-based denial of service issue [CVE-2021-3749]"> +<correction node-jszip "Use a null prototype object for this.files [CVE-2021-23413]"> +<correction node-tar "Remove non-directory paths from the directory cache [CVE-2021-32803]; strip absolute paths more comprehensively [CVE-2021-32804]"> +<correction nvidia-cuda-toolkit "Fix setting of NVVMIR_LIBRARY_DIR on ppc64el"> +<correction nvidia-graphics-drivers "New upstream stable release; fix denial of service issues [CVE-2021-1093 CVE-2021-1094 CVE-2021-1095]; nvidia-driver-libs: Add Recommends: libnvidia-encode1"> +<correction nvidia-graphics-drivers-legacy-390xx "New upstream stable release; fix denial of service issues [CVE-2021-1093 CVE-2021-1094 CVE-2021-1095]; nvidia-legacy-390xx-driver-libs: Add Recommends: libnvidia-legacy-390xx-encode1"> +<correction postgresql-11 "New upstream stable release; fix mis-planning of repeated application of a projection step [CVE-2021-3677]; disallow SSL renegotiation more completely"> +<correction proftpd-dfsg "Fix <q>mod_radius leaks memory contents to radius server</q>, <q>cannot disable client-initiated renegotiation for FTPS</q>, navigation into symlinked directories, mod_sftp crash when using pubkey-auth with DSA keys"> +<correction psmisc "Fix regression in killall not matching process with names longer than 15 characters"> +<correction python-uflash "Update firmware URL"> +<correction request-tracker4 "Fix login timing side-channel attack issue [CVE-2021-38562]"> +<correction ring "Fix denial of service issue in the embedded copy of pjproject [CVE-2021-21375]"> +<correction sabnzbdplus "Prevent directory escape in renamer function [CVE-2021-29488]"> +<correction shim "Add arm64 patch to tweak section layout and stop crashing problems; in insecure mode, don't abort if we can't create the MokListXRT variable; don't abort on grub installation failures; warn instead"> +<correction shim-helpers-amd64-signed "Add arm64 patch to tweak section layout and stop crashing problems; in insecure mode, don't abort if we can't create the MokListXRT variable; don't abort on grub installation failures; warn instead"> +<correction shim-helpers-arm64-signed "Add arm64 patch to tweak section layout and stop crashing problems; in insecure mode, don't abort if we can't create the MokListXRT variable; don't abort on grub installation failures; warn instead"> +<correction shim-helpers-i386-signed "Add arm64 patch to tweak section layout and stop crashing problems; in insecure mode, don't abort if we can't create the MokListXRT variable; don't abort on grub installation failures; warn instead"> +<correction shim-signed "Work around boot-breaking issues on arm64 by including an older known working version of unsigned shim on that platform; switch arm64 back to using a current unsigned build; add arm64 patch to tweak section layout and stop crashing problems; in insecure mode, don't abort if we can't create the MokListXRT variable; don't abort on grub installation failures; warn instead"> +<correction shiro "Fix authentication bypass issues [CVE-2020-1957 CVE-2020-11989 CVE-2020-13933 CVE-2020-17510]; update Spring Framework compatibility patch; support Guice 4"> +<correction tzdata "Update DST rules for Samoa and Jordan; confirm the absence of a leap second on 2021-12-31"> +<correction ublock-origin "New upstream stable release; fix denial of service issue [CVE-2021-36773]"> +<correction ulfius "Ensure memory is initialised before use [CVE-2021-40540]"> +<correction xmlgraphics-commons "Fix Server-Side Request Forgery issue [CVE-2020-11988]"> +<correction yubikey-manager "Add missing dependency on python3-pkg-resources to yubikey-manager"> +</table> + + +<h2>Aggiornamenti della sicurezza</h2> + +<p>Questa versione include i seguenti aggiornamenti della sicurezza al rilascio oldstable. +Il gruppo della sicurezza ha già rilasciato un avviso per ciascuno di essi:</p> + +<table border=0> +<tr><th>ID avviso</th> <th>Pacchetto</th></tr> +<dsa 2021 4842 thunderbird> +<dsa 2021 4866 thunderbird> +<dsa 2021 4876 thunderbird> +<dsa 2021 4897 thunderbird> +<dsa 2021 4927 thunderbird> +<dsa 2021 4931 xen> +<dsa 2021 4932 tor> +<dsa 2021 4933 nettle> +<dsa 2021 4934 intel-microcode> +<dsa 2021 4935 php7.3> +<dsa 2021 4936 libuv1> +<dsa 2021 4937 apache2> +<dsa 2021 4938 linuxptp> +<dsa 2021 4939 firefox-esr> +<dsa 2021 4940 thunderbird> +<dsa 2021 4941 linux-signed-amd64> +<dsa 2021 4941 linux-signed-arm64> +<dsa 2021 4941 linux-signed-i386> +<dsa 2021 4941 linux> +<dsa 2021 4942 systemd> +<dsa 2021 4943 lemonldap-ng> +<dsa 2021 4944 krb5> +<dsa 2021 4945 webkit2gtk> +<dsa 2021 4946 openjdk-11-jre-dcevm> +<dsa 2021 4946 openjdk-11> +<dsa 2021 4947 libsndfile> +<dsa 2021 4948 aspell> +<dsa 2021 4949 jetty9> +<dsa 2021 4950 ansible> +<dsa 2021 4951 bluez> +<dsa 2021 4952 tomcat9> +<dsa 2021 4953 lynx> +<dsa 2021 4954 c-ares> +<dsa 2021 4955 libspf2> +<dsa 2021 4956 firefox-esr> +<dsa 2021 4957 trafficserver> +<dsa 2021 4958 exiv2> +<dsa 2021 4959 thunderbird> +<dsa 2021 4961 tor> +<dsa 2021 4962 ledgersmb> +<dsa 2021 4963 openssl> +<dsa 2021 4964 grilo> +<dsa 2021 4967 squashfs-tools> +<dsa 2021 4969 firefox-esr> +<dsa 2021 4970 postorius> +<dsa 2021 4971 ntfs-3g> +<dsa 2021 4973 thunderbird> +<dsa 2021 4974 nextcloud-desktop> +<dsa 2021 4975 webkit2gtk> +<dsa 2021 4979 mediawiki> +</table> + + +<h2>Pacchetti rimossi</h2> + +<p>I seguenti pacchetti sono stati rimossi per motivi esterni alla nostra volontà:</p> + +<table border=0> +<tr><th>Pacchetto</th> <th>Motivo</th></tr> +<correction birdtray "Incompatible with newer Thunderbird versions"> +<correction libprotocol-acme-perl "Only supports obsolete ACME version 1"> + +</table> + +<h2>Procedura di installazione di Debian</h2> +<p>La procedura di installazione è stata aggiornata per includere gli +aggiornamenti presenti in questo rilascio minore.</p> + +<h2>URL</h2> + +<p>L'elenco completo dei pacchetti che sono cambiati con questa revisione:</p> + +<div class="center"> + <url "https://deb.debian.org/debian/dists/<downcase <codename>>/ChangeLog"> +</div> + +<p>La attuale distribuzione oldstable:</p> + +<div class="center"> + <url "https://deb.debian.org/debian/dists/oldstable/"> +</div> + +<p>Aggiornamenti proposti per la distribuzione oldstable:</p> + +<div class="center"> + <url "https://deb.debian.org/debian/dists/oldstable-proposed-updates"> +</div> + +<p>Informazioni sulla distribuzione oldstable (note di rilascio, errata, etc.):</p> + +<div class="center"> + <a + href="$(HOME)/releases/oldstable/">https://www.debian.org/releases/oldstable/</a> +</div> + +<p>Annunci e informazioni sulla sicurezza:</p> + +<div class="center"> + <a href="$(HOME)/security/">https://www.debian.org/security/</a> +</div> + +<h2>Su Debian</h2> + +<p>Il progetto Debian è una associazione di sviluppatori di software +libero che offrono volontariamente il loro tempo e il loro lavoro per +produrre il sistema operativo totalmente libero Debian.</p> + +<h2>Contatti</h2> + +<p>Per maggiori informazioni, visitare le pagine web del sito Debian +<a href="$(HOME)/">https://www.debian.org/</a>, inviare email a +<press@debian.org> o contattare il gruppo del rilascio stabile a +<debian-release@lists.debian.org>.</p> + + |