aboutsummaryrefslogtreecommitdiffstats
path: root/italian/News
diff options
context:
space:
mode:
authorGiuseppe Sacco <eppesuig@debian.org>2023-12-11 08:16:14 +0100
committerGiuseppe Sacco <eppesuig@debian.org>2023-12-11 08:16:14 +0100
commit4dfe501e263a3086704b0e0b925212747e76fb84 (patch)
tree0367d61f4054e7ea65692b7a9a0ec900e46fefe8 /italian/News
parent5192b6af31d6787efb43b3bb57412305d11f1992 (diff)
Translation of Debian 12.4 announcement
Diffstat (limited to 'italian/News')
-rw-r--r--italian/News/2023/20231210.wml304
-rw-r--r--italian/News/2023/2023121002.wml40
2 files changed, 344 insertions, 0 deletions
diff --git a/italian/News/2023/20231210.wml b/italian/News/2023/20231210.wml
new file mode 100644
index 00000000000..d5a67f44d5a
--- /dev/null
+++ b/italian/News/2023/20231210.wml
@@ -0,0 +1,304 @@
+#use wml::debian::translation-check translation="46a65593f41df0f8a98f3100ec041156d76dd1ae" maintainer="Giuseppe Sacco"
+<define-tag pagetitle>Rilasciato aggiornamento di Debian 12: 12.4</define-tag>
+<define-tag release_date>2023-12-10</define-tag>
+#use wml::debian::news
+# $Id:
+
+<define-tag release>12</define-tag>
+<define-tag codename>bookworm</define-tag>
+<define-tag revision>12.4</define-tag>
+
+<define-tag dsa>
+ <tr><td align="center"><a href="$(HOME)/security/%0/dsa-%1">DSA-%1</a></td>
+ <td align="center"><:
+ my @p = ();
+ for my $p (split (/,\s*/, "%2")) {
+ push (@p, sprintf ('<a href="https://packages.debian.org/src:%s">%s</a>', $p, $p));
+ }
+ print join (", ", @p);
+:></td></tr>
+</define-tag>
+
+<define-tag correction>
+ <tr><td><a href="https://packages.debian.org/src:%0">%0</a></td> <td>%1</td></tr>
+</define-tag>
+
+<define-tag srcpkg><a href="https://packages.debian.org/src:%0">%0</a></define-tag>
+
+<p>Attenzione: questo documento è stato aggiornato perché Debian 12.4 sostituisce
+Debian 12.3. Queste modifiche sono dovute ad un bollettino della sicurezza <a
+href=https://bugs.debian.org/1057843>#1057843</a> a proposito di problemi con
+il kernel-image-6.1.0-14 (6.1.64-1).</p>
+
+<p>Debian 12.4 viene rilasciata con kernel-image-6.1.0-15 (6.1.66), oltre ad alcune
+altre correzioni</p>
+
+<p>Il progetto Debian è felice di annunciare il secondo aggiornamento della
+distribuzione stabile Debian <release> (nome in codice <q><codename></q>).
+Questo aggiornamento minore aggiunge soluzioni di problemi di sicurezza,
+oltre ad alcune correzioni per problemi seri. I bollettini della sicurezza
+sono già stati pubblicati separatamente e sono qui elencati dove possibile.</p>
+
+<p>Notare che questo rilascio minore non è una nuova versione di Debian
+<release> ma solo un aggiornamento di alcuni pacchetti che ne fanno parte.
+Non è necessario buttare via il vecchio supporto di installazione di <q><codename></q>. Dopo
+l'installazione i pacchetti verranno aggiornati alle ultime versioni usando
+uno qualsiasi dei mirror Debian aggiornati.</p>
+
+<p>Coloro che aggiornano il sistema frequentemente tramite security.debian.org
+non avranno molti pacchetti da aggiornare, e molti di questi sono inclusi
+nel rilascio minore.</p>
+
+<p>Nuove immagini per l'installazione saranno presto disponibili nelle
+posizioni usuali.</p>
+
+<p>Aggiornare una installazione esistente a questa revisione, può essere
+fatto configurando il sistema di gestione dei pacchetti per puntare ad uno dei tanti
+mirror HTTP Debian.
+Un elenco completo di questi mirror è disponibile qui:</p>
+
+<div class="center">
+ <a href="$(HOME)/mirror/list">https://www.debian.org/mirror/list</a>
+</div>
+
+
+<h2>Risoluzione di problemi vari</h2>
+
+<p>Questo aggiornamento aggiunge alcune importanti correzioni ai seguenti pacchetti (in inglese):</p>
+
+<table border=0>
+<tr><th>Pacchetto</th> <th>Motivo</th></tr>
+<correction adequate "Skip symbol-size-mismatch test on architectures where array symbols don't include a specific length; disable deprecation warnings about smartmatch, given, when in Perl 5.38; fix warnings from version comparison about smartmatch being experimental">
+<correction amanda "Fix local privilege escalation [CVE-2023-30577]">
+<correction arctica-greeter "Move logo away from border when greeting">
+<correction awstats "Avoid prompts on upgrade due to logrotate configuration cleanup">
+<correction axis "Filter out unsupported protocols in the client class ServiceFactory [CVE-2023-40743]">
+<correction base-files "Update for the 12.4 point release">
+<correction ca-certificates-java "Remove circular dependencies">
+<correction calibre "Fix crash in Get Books when regenerating UIC files">
+<correction crun "Fix containers with systemd as their init system, when using newer kernel versions">
+<correction cups "Take into account that on some printers the ColorModel option's choice for color printing is CMYK and not RGB">
+<correction dav4tbsync "New upstream version, restoring compatibility with newer Thunderbird versions">
+<correction debian-edu-artwork "Provide an Emerald theme based artwork for Debian Edu 12">
+<correction debian-edu-config "New upstream stable version; fix setting and changing of LDAP passwords">
+<correction debian-edu-doc "Update included documentation and translations">
+<correction debian-edu-fai "New upstream stable version">
+<correction debian-edu-router "Fix dnsmasq conf generation for networks over VLAN; only generate UIF filter rules for SSH if 'Uplink' interface is defined; update translations">
+<correction debian-installer "Increase Linux kernel ABI to 6.1.0-15; rebuild against proposed-updates">
+<correction debian-installer-netboot-images "Rebuild against proposed-updates">
+<correction debootstrap "Backport merged-/usr support changes from trixie: implement merged-/usr by post-merging, default to merged-/usr for suites newer than bookworm in all profiles">
+<correction devscripts "Debchange: Update to current Debian distributions">
+<correction dhcpcd5 "Change Breaks/Replaces dhcpcd5 to Conflicts">
+<correction di-netboot-assistant "Fix support for bookworm live ISO image">
+<correction distro-info "Update tests for distro-info-data 0.58+deb12u1, which adjusted Debian 7's EoL date">
+<correction distro-info-data "Add Ubuntu 24.04 LTS Noble Numbat; fix several End Of Life dates">
+<correction eas4tbsync "New upstream version, restoring compatibility with newer Thunderbird versions">
+<correction exfatprogs "Fix out-of-bounds memory access issues [CVE-2023-45897]">
+<correction exim4 "Fix security issues relating to the proxy protocol [CVE-2023-42117] and DNSDB lookups [CVE-2023-42119]; add hardening for SPF lookups; disallow UTF-16 surrogates from ${utf8clean:...}; fix crash with <q>tls_dhparam = none</q>; fix $recipients expansion when used within ${run...}; fix expiry date of auto-generated SSL certificates; fix crash induced by some combinations of zero-length strings and ${tr...}">
+<correction fonts-noto-color-emoji "Add support for Unicode 15.1">
+<correction gimp "Add Conflicts and Replaces: gimp-dds to remove old versions of this plugin shipped by gimp itself since 2.10.10">
+<correction gnome-characters "Add support for Unicode 15.1">
+<correction gnome-session "Open text files in gnome-text-editor if gedit is not installed">
+<correction gnome-shell "New upstream stable release; allow notifications to be dismissed with backspace key in addition to the delete key; fix duplicate devices shown when reconnecting to PulseAudio; fix possible use-after-free crashes on PulseAudio/Pipewire restart; avoid sliders in quick settings (volume, etc.) being reported to accessibility tools as their own parent object; align scrolled viewports to the pixel grid to avoid jitter visible during scrolling">
+<correction gnutls28 "Fix timing sidechannel issue [CVE-2023-5981]">
+<correction gosa "New upstream stable release">
+<correction gosa-plugins-sudo "Fix uninitialised variable">
+<correction hash-slinger "Fix generation of TLSA records">
+<correction intel-graphics-compiler "Fix compatibility with stable's intel-vc-intrinsics version">
+<correction iotop-c "Fix the logic in <q>only</q> option; fix busy loop when ESC is pressed; fix ASCII graph rendering">
+<correction jdupes "Update prompts to help avoid choices that could lead to unexpected data loss">
+<correction lastpass-cli "New upstream stable release; update certificate hashes; add support for reading encrypted URLs">
+<correction libapache2-mod-python "Ensure binNMU versions are PEP-440-compliant">
+<correction libde265 "Fix segmentation violation issue [CVE-2023-27102], buffer overflow issues [CVE-2023-27103 CVE-2023-47471], buffer over-read issue [CVE-2023-43887]">
+<correction libervia-backend "Fix start failure without pre-existing configuration; make exec path absolute in dbus service file; fix dependencies on python3-txdbus/python3-dbus">
+<correction libmateweather "Locations: add San Miguel de Tucuman (Argentina); update forecast zones for Chicago; update data server URL; fix some location names">
+<correction libsolv "Enable support for zstd compression">
+<correction linux "Update to upstream stable release 6.1.64; update ABI to 14; [rt] Update to 6.1.59-rt16; enable X86_PLATFORM_DRIVERS_HP; nvmet: nul-terminate the NQNs passed in the connect command [CVE-2023-6121]">
+<correction linux-signed-amd64 "Update to upstream stable release 6.1.64; update ABI to 14; [rt] Update to 6.1.59-rt16; enable X86_PLATFORM_DRIVERS_HP; nvmet: nul-terminate the NQNs passed in the connect command [CVE-2023-6121]">
+<correction linux-signed-arm64 "Update to upstream stable release 6.1.64; update ABI to 14; [rt] Update to 6.1.59-rt16; enable X86_PLATFORM_DRIVERS_HP; nvmet: nul-terminate the NQNs passed in the connect command [CVE-2023-6121]">
+<correction linux-signed-i386 "Update to upstream stable release 6.1.64; update ABI to 14; [rt] Update to 6.1.59-rt16; enable X86_PLATFORM_DRIVERS_HP; nvmet: nul-terminate the NQNs passed in the connect command [CVE-2023-6121]">
+<correction llvm-toolchain-16 "New backported package to support builds of newer chromium versions">
+<correction lxc "Fix creating of ephemeral copies">
+<correction mda-lv2 "Fix LV2 plugin installation location">
+<correction midge "Remove non-free example files">
+<correction minizip "Fix integer and heap overflow issues [CVE-2023-45853]">
+<correction mrtg "Handle relocated configuration file; translation updates">
+<correction mutter "New upstream stable release; fix the ability to drag libdecor windows by their title bar on touchscreens; fix flickering and rendering artifacts when using software rendering; improve GNOME Shell app grid performance by avoiding repainting monitors other than the one it is displayed on">
+<correction nagios-plugins-contrib "Fix on-disk kernel version detection">
+<correction network-manager-openconnect "Add User Agent to Openconnect VPN for NetworkManager">
+<correction node-undici "Delete cookie and host headers on cross-origin redirect [CVE-2023-45143]">
+<correction nvidia-graphics-drivers "New upstream release; fix null pointer dereference issue [CVE-2023-31022]">
+<correction nvidia-graphics-drivers-tesla "New upstream release; fix null pointer dereference issue [CVE-2023-31022]">
+<correction nvidia-graphics-drivers-tesla-470 "New upstream release; fix null pointer dereference issue [CVE-2023-31022]">
+<correction nvidia-open-gpu-kernel-modules "New upstream release; fix null pointer dereference issue [CVE-2023-31022]">
+<correction opendkim "Fix removal of incoming Authentication-Results: headers [CVE-2022-48521]">
+<correction openrefine "Fix remote code execution vulnerability [CVE-2023-41887 CVE-2023-41886]">
+<correction opensc "Fix out-of-bounds read issue [CVE-2023-4535], potential PIN bypass [CVE-2023-40660], memory-handling issues [CVE-2023-40661]">
+<correction oscrypto "Fix OpenSSL version parsing; fix autopkgtest">
+<correction pcs "Fix <q>resource move</q>">
+<correction perl "Fix buffer overrun issue [CVE-2023-47038]">
+<correction php-phpseclib3 "Fix denial of service issue [CVE-2023-49316]">
+<correction postgresql-15 "New upstream stable release; fix SQL injection issue [CVE-2023-39417]; fix MERGE to enforce row security policies properly [CVE-2023-39418]">
+<correction proftpd-dfsg "Fix size of SSH key exchange buffers">
+<correction python-cogent "Only skip tests that require multiple CPUs when running on a single CPU system">
+<correction python3-onelogin-saml2 "Fix expired test payloads">
+<correction pyzoltan "Support building on single core systems">
+<correction qbittorrent "Disable UPnP for web UI by default in qbittorrent-nox">
+<correction qemu "Update to upstream stable release 7.2.7; hw/scsi/scsi-disk: Disallow block sizes smaller than 512 [CVE-2023-42467]">
+<correction qpdf "Fix data loss issue with some quoted octal strings">
+<correction redis "Drop ProcSubset=pid hardening flag from the systemd unit due to it causing crashes">
+<correction rust-sd "Ensure binary package versions sorts correctly relative to older releases (where it was built from a different source package)">
+<correction sitesummary "Use systemd timer for running sitesummary-client if available">
+<correction speech-dispatcher-contrib "Enable voxin on armhf and arm64">
+<correction spyder "Fix interface language auto-configuration">
+<correction symfony "Fix session fixation issue [CVE-2023-46733]; add missing escaping [CVE-2023-46734]">
+<correction systemd "New upstream stable release">
+<correction tbsync "New upstream version, restoring compatibility with newer Thunderbird versions">
+<correction toil "Only request a single core for tests">
+<correction tzdata "Update leap second list">
+<correction unadf "Fix buffer overflow issue [CVE-2016-1243]; fix code execution issue [CVE-2016-1244]">
+<correction vips "Fix null pointer dereference issue [CVE-2023-40032]">
+<correction weborf "Fix denial of service issue">
+<correction wormhole-william "Disable flaky tests, fixing build failures">
+<correction xen "New upstream stable update; fix several security issues [CVE-2022-40982 CVE-2023-20569 CVE-2023-20588 CVE-2023-20593 CVE-2023-34320 CVE-2023-34321 CVE-2023-34322 CVE-2023-34323 CVE-2023-34325 CVE-2023-34326 CVE-2023-34327 CVE-2023-34328 CVE-2023-46835 CVE-2023-46836]">
+<correction yuzu "Strip :native from glslang-tools build dependency, fixing build failure">
+</table>
+
+
+<h2>Aggiornamenti della sicurezza</h2>
+
+
+<p>Questa revisione contiene i seguenti aggiornamenti per la sicurezza
+del rilascio stabile. Il gruppo della sicurezza ha già rilasciato i bollettini
+per ciascuno di questi aggionamenti:</p>
+
+<table border=0>
+<tr><th>Numero del bollettino</th> <th>Pacchetto</th></tr>
+<dsa 2023 5499 chromium>
+<dsa 2023 5506 firefox-esr>
+<dsa 2023 5508 chromium>
+<dsa 2023 5511 mosquitto>
+<dsa 2023 5512 exim4>
+<dsa 2023 5513 thunderbird>
+<dsa 2023 5514 glibc>
+<dsa 2023 5515 chromium>
+<dsa 2023 5516 libxpm>
+<dsa 2023 5517 libx11>
+<dsa 2023 5518 libvpx>
+<dsa 2023 5519 grub-efi-amd64-signed>
+<dsa 2023 5519 grub-efi-arm64-signed>
+<dsa 2023 5519 grub-efi-ia32-signed>
+<dsa 2023 5519 grub2>
+<dsa 2023 5520 mediawiki>
+<dsa 2023 5521 tomcat10>
+<dsa 2023 5523 curl>
+<dsa 2023 5524 libcue>
+<dsa 2023 5525 samba>
+<dsa 2023 5526 chromium>
+<dsa 2023 5527 webkit2gtk>
+<dsa 2023 5528 node-babel7>
+<dsa 2023 5529 slurm-wlm-contrib>
+<dsa 2023 5529 slurm-wlm>
+<dsa 2023 5531 roundcube>
+<dsa 2023 5532 openssl>
+<dsa 2023 5533 gst-plugins-bad1.0>
+<dsa 2023 5534 xorg-server>
+<dsa 2023 5535 firefox-esr>
+<dsa 2023 5536 chromium>
+<dsa 2023 5538 thunderbird>
+<dsa 2023 5539 node-browserify-sign>
+<dsa 2023 5540 jetty9>
+<dsa 2023 5541 request-tracker5>
+<dsa 2023 5542 request-tracker4>
+<dsa 2023 5543 open-vm-tools>
+<dsa 2023 5544 zookeeper>
+<dsa 2023 5545 vlc>
+<dsa 2023 5546 chromium>
+<dsa 2023 5547 pmix>
+<dsa 2023 5548 jtreg6>
+<dsa 2023 5548 openjdk-17>
+<dsa 2023 5549 trafficserver>
+<dsa 2023 5550 cacti>
+<dsa 2023 5551 chromium>
+<dsa 2023 5552 ffmpeg>
+<dsa 2023 5553 postgresql-15>
+<dsa 2023 5555 openvpn>
+<dsa 2023 5556 chromium>
+<dsa 2023 5557 webkit2gtk>
+<dsa 2023 5558 netty>
+<dsa 2023 5559 wireshark>
+<dsa 2023 5560 strongswan>
+<dsa 2023 5561 firefox-esr>
+<dsa 2023 5562 tor>
+<dsa 2023 5563 intel-microcode>
+<dsa 2023 5564 gimp>
+<dsa 2023 5565 gst-plugins-bad1.0>
+<dsa 2023 5566 thunderbird>
+<dsa 2023 5567 tiff>
+<dsa 2023 5568 fastdds>
+<dsa 2023 5569 chromium>
+<dsa 2023 5570 nghttp2>
+<dsa 2023 5571 rabbitmq-server>
+</table>
+
+
+<h2>Pacchetti rimossi</h2>
+
+<p>I seguenti pacchetti sono stati rimossi per motivi indipendenti da noi:</p>
+
+<table border=0>
+<tr><th>Pacchetto</th> <th>Motivo</th></tr>
+<correction gimp-dds "No longer required; integrated into GIMP">
+
+</table>
+
+<<h2>Istallatore Debian</h2>
+<p>La procedura di installazione è stata aggiornata per includere le correzioni
+presenti in questo rilascio minore.</p>
+
+<h2>URL</h2>
+
+<p>L'elenco completo dei pacchetti cambiati in questa revisione:</p>
+
+<div class="center">
+ <url "https://deb.debian.org/debian/dists/<downcase <codename>>/ChangeLog">
+</div>
+
+<p>La distribuzione stabile attuale:</p>
+
+<div class="center">
+ <url "https://deb.debian.org/debian/dists/stable/">
+</div>
+
+<p>Aggiornamenti proposti per la distribuzione stabile:</p>
+
+<div class="center">
+ <url "https://deb.debian.org/debian/dists/proposed-updates">
+</div>
+
+<p>Informazioni sulla distribuzione stabile (note di rilascio, errata, etc.):</p>
+
+<div class="center">
+ <a
+ href="$(HOME)/releases/stable/">https://www.debian.org/releases/stable/</a>
+</div>
+
+<p>Annunci e informazioni della sicurezza:</p>
+
+<div class="center">
+ <a href="$(HOME)/security/">https://www.debian.org/security/</a>
+</div>
+
+<h2>Su Debian</h2>
+
+<p>Il progetto Debian è una associazione di sviluppatori di software libero che
+volontariamente offrono il loro tempo e il loro lavoro per produrre il sistema
+operativo completamente libero Debian.</p>
+
+<h2>Contatti</h2>
+
+<p>Per maggiori informazioni visitare le pagine web Debian
+<a href="$(HOME)/">https://www.debian.org/</a>, mandare un email a
+&lt;press@debian.org&gt; o contattare il gruppo del rilascio stabile a
+&lt;debian-release@lists.debian.org&gt;.</p>
+
diff --git a/italian/News/2023/2023121002.wml b/italian/News/2023/2023121002.wml
new file mode 100644
index 00000000000..60f97829417
--- /dev/null
+++ b/italian/News/2023/2023121002.wml
@@ -0,0 +1,40 @@
+#use wml::debian::translation-check translation="b3138ee481e44272348cf53d8e207b404dba4192" maintainer="Giuseppe Sacco"
+<define-tag pagetitle>Debian 12.4 sostituisce Debian 12.3</define-tag>
+<define-tag release_date>2023-12-10</define-tag>
+#use wml::debian::news
+# $Id:
+
+<p>
+Durante il rilascio, il gruppo che si occupa dei rilasci è stato avvisato della
+possibilità di corruzione di file system con linux-image-6.1.0-14*.
+</p>
+
+</p>Una volta a conoscenza del problema, abbiamo interrotto immediatamente il
+rilascio di Debian 12.3 con vari annunci su liste di messaggi e canali social per
+comunicare agli utenti di fare attenzione con gli aggiornamenti finché non avessimo
+risolto il problema.
+</p>
+
+<p>Tutta la rete dei mirror è stata completamente aggiornata per riflettere
+i cambiamenti presenti in Debian 12.4, che adesso presentiamo con orgoglio.
+</p>
+
+<p>Grazie a tutti,
+</p>
+
+<p>Il progeto Debian
+</p>
+
+<h2>Su Debian</h2>
+
+<p>Il progetto Debian è una associazione di sviluppatori di software libero che
+volontariamente offrono il loro tempo e il loro lavoro per produrre il sistema
+operativo completamente libero Debian.</p>
+
+<h2>Contatti</h2>
+
+<p>Per maggiori informazioni visitare le pagine web Debian
+<a href="$(HOME)/">https://www.debian.org/</a>, mandare un email a
+&lt;press@debian.org&gt; o contattare il gruppo del rilascio stabile a
+&lt;debian-release@lists.debian.org&gt;.</p>
+

© 2014-2024 Faster IT GmbH | imprint | privacy policy