aboutsummaryrefslogtreecommitdiffstats
path: root/italian/News
diff options
context:
space:
mode:
authorLuca Monducci <luca.mo@tiscali.it>2021-10-10 14:23:01 +0200
committerLuca Monducci <luca.mo@tiscali.it>2021-10-10 14:23:01 +0200
commit018d1dce18b3d246e256af1d3ff586939e1125a8 (patch)
tree840a8435088837605ee29ad6d7e8c4fa1bc6be4f /italian/News
parente32dce61f078a2a393f15dae4a13b342160d1b9f (diff)
(it) releases 10.11 11.1 fix typo
Diffstat (limited to 'italian/News')
-rw-r--r--italian/News/2021/20210619.wml2
-rw-r--r--italian/News/2021/20211009.wml253
-rw-r--r--italian/News/2021/2021100902.wml242
3 files changed, 496 insertions, 1 deletions
diff --git a/italian/News/2021/20210619.wml b/italian/News/2021/20210619.wml
index b5b8f9c4a2c..7fba9ba24ab 100644
--- a/italian/News/2021/20210619.wml
+++ b/italian/News/2021/20210619.wml
@@ -29,7 +29,7 @@
sua distribuzione stabile Debian <release> (codice <q><codename></q>).
Questo rilascio minore aggiunge principalmente correzioni e risoluzioni
di problemi di sicurezza, oltre che pochi aggiustamenti per problemi seri.
-Gli annunci della sicurezza sono già stati pubblicati separamente e sono
+Gli annunci della sicurezza sono già stati pubblicati separatamente e sono
qui elencati quando disponibili.</p>
<p>Questo aggiornamento minore non costituisce una nuova versione di Debian
diff --git a/italian/News/2021/20211009.wml b/italian/News/2021/20211009.wml
new file mode 100644
index 00000000000..d2a3eb836e8
--- /dev/null
+++ b/italian/News/2021/20211009.wml
@@ -0,0 +1,253 @@
+<define-tag pagetitle>Aggiornamento Debian 11: rilasciato 11.1</define-tag>
+<define-tag release_date>2021-10-09</define-tag>
+#use wml::debian::news
+#use wml::debian::translation-check translation="d9e5cd3d7df23feb17458b95c465e062e9cd6e5a"
+
+<define-tag release>11</define-tag>
+<define-tag codename>bullseye</define-tag>
+<define-tag revision>11.1</define-tag>
+
+<define-tag dsa>
+ <tr><td align="center"><a href="$(HOME)/security/%0/dsa-%1">DSA-%1</a></td>
+ <td align="center"><:
+ my @p = ();
+ for my $p (split (/,\s*/, "%2")) {
+ push (@p, sprintf ('<a href="https://packages.debian.org/src:%s">%s</a>', $p, $p));
+ }
+ print join (", ", @p);
+:></td></tr>
+</define-tag>
+
+<define-tag correction>
+ <tr><td><a href="https://packages.debian.org/src:%0">%0</a></td> <td>%1</td></tr>
+</define-tag>
+
+<define-tag srcpkg><a href="https://packages.debian.org/src:%0">%0</a></define-tag>
+
+<p>Il progetto Debian è felice di annunciare il primo aggiornamento della
+sua distribuzione stable Debian <release> (codice <q><codename></q>).
+Questo rilascio minore aggiunge principalmente correzioni e risoluzioni
+di problemi di sicurezza, oltre che pochi aggiustamenti per problemi seri.
+Gli annunci della sicurezza sono già stati pubblicati separatamente e sono
+qui elencati quando disponibili.</p>
+
+<p>Questo aggiornamento minore non costituisce una nuova versione di Debian
+<release> ma ne aggiorna solamente alcuni pacchetti. Non è necessario buttare
+via il vecchio supporto di <q><codename></q>: dopo l'installazione i pacchetti
+potranno essere aggiornati all'ultima versione usando un mirror aggiornato.</p>
+
+<p>Quelli che installano frequentemente gli aggiornamenti da security.debian.org
+non dovranno aggiornare molti pacchetti, e molti di questi aggiornamenti sono
+inclusi anche nel rilascio minore.</p>
+
+<p>Nuove immagini per l'installazione verranno presto rese disponibili
+al solito indirizzo.</p>
+
+<p>Per aggiornare una installazione esistente a questa revisione è
+sufficiente usare il sistema di gestione dei pacchetti e uno dei tanti mirror
+HTTP Debian. Un elenco completo dei mirror è disponibile qui:</p>
+
+<div class="center">
+ <a href="$(HOME)/mirror/list">https://www.debian.org/mirror/list</a>
+</div>
+
+
+
+
+<h2>Aggiornamenti vari</h2>
+
+<p>Questo aggiornamento alla versione stable aggiungere alcune importanti correzioni ai seguenti pacchetti:</p>
+
+<table border=0>
+<tr><th>Pacchetto</th> <th>Motivo</th></tr>
+<correction apr "Prevent out-of-bounds array dereference">
+<correction atftp "Fix buffer overflow [CVE-2021-41054]">
+<correction automysqlbackup "Fix crash when using <q>LATEST=yes</q>">
+<correction base-files "Update for the 11.1 point release">
+<correction clamav "New upstream stable release; fix clamdscan segfaults when --fdpass and --multipass are used together with ExcludePath">
+<correction cloud-init "Avoid duplicate includedir in /etc/sudoers">
+<correction cyrus-imapd "Fix denial-of-service issue [CVE-2021-33582]">
+<correction dazzdb "Fix a use-after-free in DBstats">
+<correction debian-edu-config "debian-edu-ltsp-install: extend main server related exclude list; add slapd and xrdp-sesman to the list of masked services">
+<correction debian-installer "Rebuild against proposed updates; update Linux ABI to 5.10.0-9; use udebs from proposed-updates">
+<correction debian-installer-netboot-images "Rebuild against proposed-updates; use udebs from proposed-updates and stable; use xz-compressed Packages files">
+<correction detox "Fix handling of large files">
+<correction devscripts "Make the --bpo option target bullseye-backports">
+<correction dlt-viewer "Add missing qdlt/qdlt*.h header files to dev package">
+<correction dpdk "New upstream stable release">
+<correction fetchmail "Fix segmentation fault and security regression">
+<correction flatpak "New upstream stable release; don't inherit an unusual $XDG_RUNTIME_DIR setting into the sandbox">
+<correction freeradius "Fix thread crash and sample configuration">
+<correction galera-3 "New upstream stable release">
+<correction galera-4 "New upstream stable release; solve circular Conflicts with galera-3 by no longer providing a virtual <q>galera</q> package">
+<correction glewlwyd "Fix possible buffer overflow during FIDO2 signature validation in webauthn registration [CVE-2021-40818]">
+<correction glibc "Restart openssh-server even if it has been deconfigured during the upgrade; fix text fallback when debconf is unusable">
+<correction gnome-maps "New upstream stable release; fix a crash when starting up with last-used map type being aerial, and no aerial tile definition is found; don't sometimes write broken last view position on exit; fix hang when dragging around route markers">
+<correction gnome-shell "New upstream stable release; fix freeze after cancelling (some) system-modal dialogs; fix word suggestions in on-screen keyboard; fix crashes">
+<correction hdf5 "Adjust package dependencies to improve upgrade paths from older releases">
+<correction iotop-c "Properly handle UTF-8 process names">
+<correction jailkit "Fix creation of jails that need to use /dev; fix library presence check">
+<correction java-atk-wrapper "Also use dbus to detect accessibility being enabled">
+<correction krb5 "Fix KDC null dereference crash on FAST request with no server field [CVE-2021-37750]; fix memory leak in krb5_gss_inquire_cred">
+<correction libavif "Use correct libdir in libavif.pc pkgconfig file">
+<correction libbluray "Switch to embedded libasm; the version from libasm-java is too new">
+<correction libdatetime-timezone-perl "New upstream stable release; update DST rules for Samoa and Jordon; confirmation of no leap second on 2021-12-31">
+<correction libslirp "Fix multiple buffer overflow issues [CVE-2021-3592 CVE-2021-3593 CVE-2021-3594 CVE-2021-3595]">
+<correction linux "New upstream stable release; increase ABI to 9; [rt] Update to 5.10.65-rt53; [mipsel] bpf, mips: Validate conditional branch offsets [CVE-2021-38300]">
+<correction linux-signed-amd64 "New upstream stable release; increase ABI to 9; [rt] Update to 5.10.65-rt53; [mipsel] bpf, mips: Validate conditional branch offsets [CVE-2021-38300]">
+<correction linux-signed-arm64 "New upstream stable release; increase ABI to 9; [rt] Update to 5.10.65-rt53; [mipsel] bpf, mips: Validate conditional branch offsets [CVE-2021-38300]">
+<correction linux-signed-i386 "New upstream stable release; increase ABI to 9; [rt] Update to 5.10.65-rt53; [mipsel] bpf, mips: Validate conditional branch offsets [CVE-2021-38300]">
+<correction mariadb-10.5 "New upstream stable release; security fixes [CVE-2021-2372 CVE-2021-2389]">
+<correction mbrola "Fix end of file detection">
+<correction modsecurity-crs "Fix request body bypass issue [CVE-2021-35368]">
+<correction mtr "Fix regression in JSON output">
+<correction mutter "New upstream stable release; kms: Improve handling of common video modes that might exceed the possible bandwidth; ensure valid window texture size after viewport changes">
+<correction nautilus "Avoid opening multiple selected files in multiple application instances; don't save window size and position when tiled; fix some memory leaks; update translations">
+<correction node-ansi-regex "Fix regular expression-based denial of service issue [CVE-2021-3807]">
+<correction node-axios "Fix regular expression-based denial of service issue [CVE-2021-3749]">
+<correction node-object-path "Fix prototype pollution issues [CVE-2021-23434 CVE-2021-3805]">
+<correction node-prismjs "Fix regular expression-based denial of service issue [CVE-2021-3801]">
+<correction node-set-value "Fix prototype pollution [CVE-2021-23440]">
+<correction node-tar "Remove non-directory paths from the directory cache [CVE-2021-32803]; strip absolute paths more comprehensively [CVE-2021-32804]">
+<correction osmcoastline "Fix projections other than WGS84">
+<correction osmpbf "Rebuild against protobuf 3.12.4">
+<correction pam "Fix syntax error in libpam0g.postinst when a systemd unit fails">
+<correction perl "Security update; fix a regular expression memory leak">
+<correction pglogical "Update for PostgreSQL 13.4 snapshot handling fixes">
+<correction pmdk "Fix missing barriers after non-temporal memcpy">
+<correction postgresql-13 "New upstream stable release; fix mis-planning of repeated application of a projection step [CVE-2021-3677]; disallow SSL renegotiation more completely">
+<correction proftpd-dfsg "Fix <q>mod_radius leaks memory contents to radius server</q> and <q>sftp connection aborts with </q>Corrupted MAC on input""; skip escaping of already-escaped SQL text">
+<correction pyx3 "Fix horizontal font alignment issue with texlive 2020">
+<correction reportbug "Update suite names following bullseye release">
+<correction request-tracker4 "Fix login timing side-channel attack issue [CVE-2021-38562]">
+<correction rhonabwy "Fix JWE CBC tag computation and JWS alg:none signature verification">
+<correction rpki-trust-anchors "Add HTTPS URL to the LACNIC TAL">
+<correction rsync "Re-add --copy-devices; fix regression in --delay-updates; fix edge case in --mkpath; fix rsync-ssl; fix --sparce and --inplace; update options available to rrsync; documentation fixes">
+<correction ruby-rqrcode-rails3 "Fix for ruby-rqrcode 1.0 compatibility">
+<correction sabnzbdplus "Prevent directory escape in renamer function [CVE-2021-29488]">
+<correction shellcheck "Fix rendering of long options in manpage">
+<correction shiro "Fix authentication bypass issues [CVE-2020-1957 CVE-2020-11989 CVE-2020-13933 CVE-2020-17510]; update Spring Framework compatibility patch; support Guice 4">
+<correction speech-dispatcher "Fix setting of voice name for the generic module">
+<correction telegram-desktop "Avoid crash when auto-delete is enabled">
+<correction termshark "Include themes in package">
+<correction tmux "Fix a race condition which results in the config not being loaded if several clients are interacting with the server while it's initializing">
+<correction txt2man "Fix regression in handling display blocks">
+<correction tzdata "Update DST rules for Samoa and Jordan; confirm the absence of a leap second on 2021-12-31">
+<correction ublock-origin "New upstream stable release; fix denial of service issue [CVE-2021-36773]">
+<correction ulfius "Ensure memory is initialised before use [CVE-2021-40540]">
+</table>
+
+
+<h2>Aggiornamenti della sicurezza</h2>
+
+<p>Questa versione include i seguenti aggiornamenti della sicurezza al rilascio stable.
+Il gruppo della sicurezza ha già rilasciato un avviso per ciascuno di essi:</p>
+
+<table border=0>
+<tr><th>ID avviso</th> <th>Pacchetto</th></tr>
+<dsa 2021 4959 thunderbird>
+<dsa 2021 4960 haproxy>
+<dsa 2021 4961 tor>
+<dsa 2021 4962 ledgersmb>
+<dsa 2021 4963 openssl>
+<dsa 2021 4964 grilo>
+<dsa 2021 4965 libssh>
+<dsa 2021 4966 gpac>
+<dsa 2021 4967 squashfs-tools>
+<dsa 2021 4968 haproxy>
+<dsa 2021 4969 firefox-esr>
+<dsa 2021 4970 postorius>
+<dsa 2021 4971 ntfs-3g>
+<dsa 2021 4972 ghostscript>
+<dsa 2021 4973 thunderbird>
+<dsa 2021 4974 nextcloud-desktop>
+<dsa 2021 4975 webkit2gtk>
+<dsa 2021 4976 wpewebkit>
+<dsa 2021 4977 xen>
+<dsa 2021 4978 linux-signed-amd64>
+<dsa 2021 4978 linux-signed-arm64>
+<dsa 2021 4978 linux-signed-i386>
+<dsa 2021 4978 linux>
+<dsa 2021 4979 mediawiki>
+</table>
+
+
+<!--
+<h2>Pacchetti rimossi</h2>
+
+<p>I seguenti pacchetti sono stati rimossi per motivi esterni alla nostra volontà:</p>
+-->
+
+<p>
+Nella parte finale della fase di freeze di bullseye alcuni aggiornamenti
+sono stati rilasciati tramite <a href="https://security.debian.org/">l'archivio
+di sicurezza</a> ma senza il DSA di accompagnamento. Questi aggiornamenti
+sono riportati di seguito.
+</p>
+
+<table border=0>
+<tr><th>Pacchetto</th> <th>Motivo</th></tr>
+<correction apache2 "Fix mod_proxy HTTP2 request line injection [CVE-2021-33193]">
+<correction btrbk "Fix arbitrary code execution issue [CVE-2021-38173]">
+<correction c-ares "Fix missing input validation on hostnames returned by DNS servers [CVE-2021-3672]">
+<correction exiv2 "Fix overflow issues [CVE-2021-29457 CVE-2021-31292]">
+<correction firefox-esr "New upstream stable release [CVE-2021-29980 CVE-2021-29984 CVE-2021-29985 CVE-2021-29986 CVE-2021-29988 CVE-2021-29989]">
+<correction libencode-perl "Encode: mitigate @INC pollution when loading ConfigLocal [CVE-2021-36770]">
+<correction libspf2 "spf_compile.c: Correct size of ds_avail [CVE-2021-20314]; fix <q>reverse</q> macro modifier">
+<correction lynx "Fix leakage of credentials if SNI was used together with a URL containing credentials [CVE-2021-38165]">
+<correction nodejs "New upstream stable release; fix use after free issue [CVE-2021-22930]">
+<correction tomcat9 "Fix authentication bypass issue [CVE-2021-30640] and request smuggling issue [CVE-2021-33037]">
+<correction xmlgraphics-commons "Fix server side request forgery issue [CVE-2020-11988]">
+</table>
+
+
+<h2>Procedura di installazione di Debian</h2>
+
+<p>La procedura di installazione è stata aggiornata per includere gli
+aggiornamenti presenti in questo rilascio minore.</p>
+
+<h2>URL</h2>
+
+<p>L'elenco completo dei pacchetti che sono cambiati con questa revisione:</p>
+
+<div class="center">
+ <url "https://deb.debian.org/debian/dists/<downcase <codename>>/ChangeLog">
+</div>
+
+<p>La attuale distribuzione stable:</p>
+
+<div class="center">
+ <url "https://deb.debian.org/debian/dists/stable/">
+</div>
+
+<p>Aggiornamenti proposti per la distribuzione stable:</p>
+
+<div class="center">
+ <url "https://deb.debian.org/debian/dists/proposed-updates">
+</div>
+
+<p>Informazioni sulla distribuzione stable (note di rilascio, errata, etc.):</p>
+
+<div class="center">
+ <a
+ href="$(HOME)/releases/stable/">https://www.debian.org/releases/stable/</a>
+</div>
+
+<p>Annunci e informazioni sulla sicurezza:</p>
+
+<div class="center">
+ <a href="$(HOME)/security/">https://www.debian.org/security/</a>
+</div>
+
+<h2>Su Debian</h2>
+
+<p>Il progetto Debian è una associazione di sviluppatori di software
+libero che offrono volontariamente il loro tempo e il loro lavoro per
+produrre il sistema operativo totalmente libero Debian.</p>
+
+<h2>Contatti</h2>
+
+<p>Per maggiori informazioni, visitare le pagine web del sito Debian
+<a href="$(HOME)/">https://www.debian.org/</a>, inviare email a
+&lt;press@debian.org&gt; o contattare il gruppo del rilascio stabile a
+&lt;debian-release@lists.debian.org&gt;.</p>
diff --git a/italian/News/2021/2021100902.wml b/italian/News/2021/2021100902.wml
new file mode 100644
index 00000000000..9d6989fa939
--- /dev/null
+++ b/italian/News/2021/2021100902.wml
@@ -0,0 +1,242 @@
+<define-tag pagetitle>Aggiornamento Debian 10: rilasciato 10.11</define-tag>
+<define-tag release_date>2021-10-09</define-tag>
+#use wml::debian::news
+#use wml::debian::translation-check translation="d9e5cd3d7df23feb17458b95c465e062e9cd6e5a"
+
+<define-tag release>10</define-tag>
+<define-tag codename>buster</define-tag>
+<define-tag revision>10.11</define-tag>
+
+<define-tag dsa>
+ <tr><td align="center"><a href="$(HOME)/security/%0/dsa-%1">DSA-%1</a></td>
+ <td align="center"><:
+ my @p = ();
+ for my $p (split (/,\s*/, "%2")) {
+ push (@p, sprintf ('<a href="https://packages.debian.org/src:%s">%s</a>', $p, $p));
+ }
+ print join (", ", @p);
+:></td></tr>
+</define-tag>
+
+<define-tag correction>
+ <tr><td><a href="https://packages.debian.org/src:%0">%0</a></td> <td>%1</td></tr>
+</define-tag>
+
+<define-tag srcpkg><a href="https://packages.debian.org/src:%0">%0</a></define-tag>
+
+<p>Il progetto Debian è felice di annunciare l'undicesimo aggiornamento della
+sua distribuzione oldstable Debian <release> (codice <q><codename></q>).
+Questo rilascio minore aggiunge principalmente correzioni e risoluzioni
+di problemi di sicurezza, oltre che pochi aggiustamenti per problemi seri.
+Gli annunci della sicurezza sono già stati pubblicati separatamente e sono
+qui elencati quando disponibili.</p>
+
+<p>Questo aggiornamento minore non costituisce una nuova versione di Debian
+<release> ma ne aggiorna solamente alcuni pacchetti. Non è necessario buttare
+via il vecchio supporto di <q><codename></q>: dopo l'installazione i pacchetti
+potranno essere aggiornati all'ultima versione usando un mirror aggiornato.</p>
+
+<p>Quelli che installano frequentemente gli aggiornamenti da security.debian.org
+non dovranno aggiornare molti pacchetti, e molti di questi aggiornamenti sono
+inclusi anche nel rilascio minore.</p>
+
+<p>Nuove immagini per l'installazione verranno presto rese disponibili
+al solito indirizzo.</p>
+
+<p>Per aggiornare una installazione esistente a questa revisione è
+sufficiente usare il sistema di gestione dei pacchetti e uno dei tanti mirror
+HTTP Debian. Un elenco completo dei mirror è disponibile qui:</p>
+
+<div class="center">
+ <a href="$(HOME)/mirror/list">https://www.debian.org/mirror/list</a>
+</div>
+
+
+
+
+<h2>Aggiornamenti vari</h2>
+
+<p>Questo aggiornamento alla versione oldstable aggiungere alcune importanti correzioni ai seguenti pacchetti:</p>
+
+<table border=0>
+<tr><th>Pacchetto</th> <th>Motivo</th></tr>
+<correction atftp "Fix buffer overflow [CVE-2021-41054]">
+<correction base-files "Update for the 10.11 point release">
+<correction btrbk "Fix arbitrary code execution issue [CVE-2021-38173]">
+<correction clamav "New upstream stable release; fix clamdscan segfaults when --fdpass and --multipass are used together with ExcludePath">
+<correction commons-io "Fix path traversal issue [CVE-2021-29425]">
+<correction cyrus-imapd "Fix denial-of-service issue [CVE-2021-33582]">
+<correction debconf "Check that whiptail or dialog is actually usable">
+<correction debian-installer "Rebuild against buster-proposed-updates; update Linux ABI to 4.19.0-18">
+<correction debian-installer-netboot-images "Rebuild against buster-proposed-updates">
+<correction distcc "Fix GCC cross-compiler links in update-distcc-symlinks and add support for clang and CUDA (nvcc)">
+<correction distro-info-data "Update included data for several releases">
+<correction dwarf-fortress "Remove undistributable prebuilt shared libraries from the source tarball">
+<correction espeak-ng "Fix using espeak with mbrola-fr4 when mbrola-fr1 is not installed">
+<correction gcc-mingw-w64 "Fix gcov handling">
+<correction gthumb "Fix heap-based buffer overflow issue [CVE-2019-20326]">
+<correction hg-git "Fix test failures with recent git versions">
+<correction htslib "Fix autopkgtest on i386">
+<correction http-parser "Fix HTTP request smuggling issue [CVE-2019-15605]">
+<correction irssi "Fix use after free issue when sending SASL login to the server [CVE-2019-13045]">
+<correction java-atk-wrapper "Also use dbus to detect accessibility being enabled">
+<correction krb5 "Fix KDC null dereference crash on FAST request with no server field [CVE-2021-37750]; fix memory leak in krb5_gss_inquire_cred">
+<correction libdatetime-timezone-perl "New upstream stable release; update DST rules for Samoa and Jordon; confirmation of no leap second on 2021-12-31">
+<correction libpam-tacplus "Prevent shared secrets from being added in plaintext to the system log [CVE-2020-13881]">
+<correction linux "<q>proc: Track /proc/$pid/attr/ opener mm_struct</q>, fixing issues with lxc-attach; new upstream stable release; increase ABI version to 18; [rt] Update to 4.19.207-rt88; usb: hso: fix error handling code of hso_create_net_device [CVE-2021-37159]">
+<correction linux-latest "Update to 4.19.0-18 kernel ABI">
+<correction linux-signed-amd64 "<q>proc: Track /proc/$pid/attr/ opener mm_struct</q>, fixing issues with lxc-attach; new upstream stable release; increase ABI version to 18; [rt] Update to 4.19.207-rt88; usb: hso: fix error handling code of hso_create_net_device [CVE-2021-37159]">
+<correction linux-signed-arm64 "<q>proc: Track /proc/$pid/attr/ opener mm_struct</q>, fixing issues with lxc-attach; new upstream stable release; increase ABI version to 18; [rt] Update to 4.19.207-rt88; usb: hso: fix error handling code of hso_create_net_device [CVE-2021-37159]">
+<correction linux-signed-i386 "<q>proc: Track /proc/$pid/attr/ opener mm_struct</q>, fixing issues with lxc-attach; new upstream stable release; increase ABI version to 18; [rt] Update to 4.19.207-rt88; usb: hso: fix error handling code of hso_create_net_device [CVE-2021-37159]">
+<correction mariadb-10.3 "New upstream stable release; security fixes [CVE-2021-2389 CVE-2021-2372]; fix Perl executable path in scripts">
+<correction modsecurity-crs "Fix request body bypass issue [CVE-2021-35368]">
+<correction node-ansi-regex "Fix regular expression-based denial of service issue [CVE-2021-3807]">
+<correction node-axios "Fix regular expression-based denial of service issue [CVE-2021-3749]">
+<correction node-jszip "Use a null prototype object for this.files [CVE-2021-23413]">
+<correction node-tar "Remove non-directory paths from the directory cache [CVE-2021-32803]; strip absolute paths more comprehensively [CVE-2021-32804]">
+<correction nvidia-cuda-toolkit "Fix setting of NVVMIR_LIBRARY_DIR on ppc64el">
+<correction nvidia-graphics-drivers "New upstream stable release; fix denial of service issues [CVE-2021-1093 CVE-2021-1094 CVE-2021-1095]; nvidia-driver-libs: Add Recommends: libnvidia-encode1">
+<correction nvidia-graphics-drivers-legacy-390xx "New upstream stable release; fix denial of service issues [CVE-2021-1093 CVE-2021-1094 CVE-2021-1095]; nvidia-legacy-390xx-driver-libs: Add Recommends: libnvidia-legacy-390xx-encode1">
+<correction postgresql-11 "New upstream stable release; fix mis-planning of repeated application of a projection step [CVE-2021-3677]; disallow SSL renegotiation more completely">
+<correction proftpd-dfsg "Fix <q>mod_radius leaks memory contents to radius server</q>, <q>cannot disable client-initiated renegotiation for FTPS</q>, navigation into symlinked directories, mod_sftp crash when using pubkey-auth with DSA keys">
+<correction psmisc "Fix regression in killall not matching process with names longer than 15 characters">
+<correction python-uflash "Update firmware URL">
+<correction request-tracker4 "Fix login timing side-channel attack issue [CVE-2021-38562]">
+<correction ring "Fix denial of service issue in the embedded copy of pjproject [CVE-2021-21375]">
+<correction sabnzbdplus "Prevent directory escape in renamer function [CVE-2021-29488]">
+<correction shim "Add arm64 patch to tweak section layout and stop crashing problems; in insecure mode, don't abort if we can't create the MokListXRT variable; don't abort on grub installation failures; warn instead">
+<correction shim-helpers-amd64-signed "Add arm64 patch to tweak section layout and stop crashing problems; in insecure mode, don't abort if we can't create the MokListXRT variable; don't abort on grub installation failures; warn instead">
+<correction shim-helpers-arm64-signed "Add arm64 patch to tweak section layout and stop crashing problems; in insecure mode, don't abort if we can't create the MokListXRT variable; don't abort on grub installation failures; warn instead">
+<correction shim-helpers-i386-signed "Add arm64 patch to tweak section layout and stop crashing problems; in insecure mode, don't abort if we can't create the MokListXRT variable; don't abort on grub installation failures; warn instead">
+<correction shim-signed "Work around boot-breaking issues on arm64 by including an older known working version of unsigned shim on that platform; switch arm64 back to using a current unsigned build; add arm64 patch to tweak section layout and stop crashing problems; in insecure mode, don't abort if we can't create the MokListXRT variable; don't abort on grub installation failures; warn instead">
+<correction shiro "Fix authentication bypass issues [CVE-2020-1957 CVE-2020-11989 CVE-2020-13933 CVE-2020-17510]; update Spring Framework compatibility patch; support Guice 4">
+<correction tzdata "Update DST rules for Samoa and Jordan; confirm the absence of a leap second on 2021-12-31">
+<correction ublock-origin "New upstream stable release; fix denial of service issue [CVE-2021-36773]">
+<correction ulfius "Ensure memory is initialised before use [CVE-2021-40540]">
+<correction xmlgraphics-commons "Fix Server-Side Request Forgery issue [CVE-2020-11988]">
+<correction yubikey-manager "Add missing dependency on python3-pkg-resources to yubikey-manager">
+</table>
+
+
+<h2>Aggiornamenti della sicurezza</h2>
+
+<p>Questa versione include i seguenti aggiornamenti della sicurezza al rilascio oldstable.
+Il gruppo della sicurezza ha già rilasciato un avviso per ciascuno di essi:</p>
+
+<table border=0>
+<tr><th>ID avviso</th> <th>Pacchetto</th></tr>
+<dsa 2021 4842 thunderbird>
+<dsa 2021 4866 thunderbird>
+<dsa 2021 4876 thunderbird>
+<dsa 2021 4897 thunderbird>
+<dsa 2021 4927 thunderbird>
+<dsa 2021 4931 xen>
+<dsa 2021 4932 tor>
+<dsa 2021 4933 nettle>
+<dsa 2021 4934 intel-microcode>
+<dsa 2021 4935 php7.3>
+<dsa 2021 4936 libuv1>
+<dsa 2021 4937 apache2>
+<dsa 2021 4938 linuxptp>
+<dsa 2021 4939 firefox-esr>
+<dsa 2021 4940 thunderbird>
+<dsa 2021 4941 linux-signed-amd64>
+<dsa 2021 4941 linux-signed-arm64>
+<dsa 2021 4941 linux-signed-i386>
+<dsa 2021 4941 linux>
+<dsa 2021 4942 systemd>
+<dsa 2021 4943 lemonldap-ng>
+<dsa 2021 4944 krb5>
+<dsa 2021 4945 webkit2gtk>
+<dsa 2021 4946 openjdk-11-jre-dcevm>
+<dsa 2021 4946 openjdk-11>
+<dsa 2021 4947 libsndfile>
+<dsa 2021 4948 aspell>
+<dsa 2021 4949 jetty9>
+<dsa 2021 4950 ansible>
+<dsa 2021 4951 bluez>
+<dsa 2021 4952 tomcat9>
+<dsa 2021 4953 lynx>
+<dsa 2021 4954 c-ares>
+<dsa 2021 4955 libspf2>
+<dsa 2021 4956 firefox-esr>
+<dsa 2021 4957 trafficserver>
+<dsa 2021 4958 exiv2>
+<dsa 2021 4959 thunderbird>
+<dsa 2021 4961 tor>
+<dsa 2021 4962 ledgersmb>
+<dsa 2021 4963 openssl>
+<dsa 2021 4964 grilo>
+<dsa 2021 4967 squashfs-tools>
+<dsa 2021 4969 firefox-esr>
+<dsa 2021 4970 postorius>
+<dsa 2021 4971 ntfs-3g>
+<dsa 2021 4973 thunderbird>
+<dsa 2021 4974 nextcloud-desktop>
+<dsa 2021 4975 webkit2gtk>
+<dsa 2021 4979 mediawiki>
+</table>
+
+
+<h2>Pacchetti rimossi</h2>
+
+<p>I seguenti pacchetti sono stati rimossi per motivi esterni alla nostra volontà:</p>
+
+<table border=0>
+<tr><th>Pacchetto</th> <th>Motivo</th></tr>
+<correction birdtray "Incompatible with newer Thunderbird versions">
+<correction libprotocol-acme-perl "Only supports obsolete ACME version 1">
+
+</table>
+
+<h2>Procedura di installazione di Debian</h2>
+<p>La procedura di installazione è stata aggiornata per includere gli
+aggiornamenti presenti in questo rilascio minore.</p>
+
+<h2>URL</h2>
+
+<p>L'elenco completo dei pacchetti che sono cambiati con questa revisione:</p>
+
+<div class="center">
+ <url "https://deb.debian.org/debian/dists/<downcase <codename>>/ChangeLog">
+</div>
+
+<p>La attuale distribuzione oldstable:</p>
+
+<div class="center">
+ <url "https://deb.debian.org/debian/dists/oldstable/">
+</div>
+
+<p>Aggiornamenti proposti per la distribuzione oldstable:</p>
+
+<div class="center">
+ <url "https://deb.debian.org/debian/dists/oldstable-proposed-updates">
+</div>
+
+<p>Informazioni sulla distribuzione oldstable (note di rilascio, errata, etc.):</p>
+
+<div class="center">
+ <a
+ href="$(HOME)/releases/oldstable/">https://www.debian.org/releases/oldstable/</a>
+</div>
+
+<p>Annunci e informazioni sulla sicurezza:</p>
+
+<div class="center">
+ <a href="$(HOME)/security/">https://www.debian.org/security/</a>
+</div>
+
+<h2>Su Debian</h2>
+
+<p>Il progetto Debian è una associazione di sviluppatori di software
+libero che offrono volontariamente il loro tempo e il loro lavoro per
+produrre il sistema operativo totalmente libero Debian.</p>
+
+<h2>Contatti</h2>
+
+<p>Per maggiori informazioni, visitare le pagine web del sito Debian
+<a href="$(HOME)/">https://www.debian.org/</a>, inviare email a
+&lt;press@debian.org&gt; o contattare il gruppo del rilascio stabile a
+&lt;debian-release@lists.debian.org&gt;.</p>
+
+

© 2014-2024 Faster IT GmbH | imprint | privacy policy