------------------------------------------------------------------------ The Debian Project https://www.debian.org/ Updated Debian 10: 10.12 released [email protected] March 26th, 2022 https://www.debian.org/News/2022/2022032602 ------------------------------------------------------------------------
The Debian project is pleased to announce the twelfth update of its oldstable distribution Debian 10 (codename "buster"). This point release mainly adds corrections for security issues, along with a few adjustments for serious problems. Security advisories have already been published separately and are referenced where available. Please note that the point release does not constitute a new version of Debian 10 but only updates some of the packages included. There is no need to throw away old "buster" media. After installation, packages can be upgraded to the current versions using an up-to-date Debian mirror. Those who frequently install updates from security.debian.org won't have to update many packages, and most such updates are included in the point release. New installation images will be available soon at the regular locations. Upgrading an existing installation to this revision can be achieved by pointing the package management system at one of Debian's many HTTP mirrors. A comprehensive list of mirrors is available at: https://www.debian.org/mirror/list OpenSSL signature algorithm check tightening -------------------------------------------- The OpenSSL update provided in this point release includes a change to ensure that the requested signature algorithm is supported by the active security level. Although this will not affect most use-cases, it could lead to error messages being generated if a non-supported algorithm is requested - for example, use of RSA+SHA1 signatures with the default security level of 2. In such cases, the security level will need to be explicitly lowered, either for individual requests or more globally. This may require changes to the configuration of applications. For OpenSSL itself, per- request lowering can be achieved using a command-line option such as: -cipher "ALL:@SECLEVEL=1" with the relevant system-level configuration being found in /etc/ssl/ openssl.cnf Miscellaneous Bugfixes ---------------------- This oldstable update adds a few important corrections to the following packages: +--------------------------+------------------------------------------+ | Package | Reason | +--------------------------+------------------------------------------+ | apache-log4j1.2 [1] | Resolve security issues [CVE-2021-4104 | | | CVE-2022-23302 CVE-2022-23305 CVE-2022- | | | 23307], by removing support for the | | | JMSSink, JDBCAppender, JMSAppender and | | | Apache Chainsaw modules | | | | | apache-log4j2 [2] | Fix remote code execution issue | | | [CVE-2021-44832] | | | | | atftp [3] | Fix information leak issue [CVE-2021- | | | 46671] | | | | | base-files [4] | Update for the 10.12 point release | | | | | beads [5] | Rebuild against updated cimg to fix | | | multiple heap buffer overflows | | | [CVE-2020-25693] | | | | | btrbk [6] | Fix regression in the update for | | | CVE-2021-38173 | | | | | cargo-mozilla [7] | New package, backported from Debian 11, | | | to help build new rust versions | | | | | chrony [8] | Allow reading the chronyd configuration | | | file that timemaster(8) generates | | | | | cimg [9] | Fix heap buffer overflow issues | | | [CVE-2020-25693] | | | | | clamav [10] | New upstream stable release; fix denial | | | of service issue [CVE-2022-20698] | | | | | cups [11] | Fix "an input validation issue might | | | allow a malicious application to read | | | restricted memory" [CVE-2020-10001] | | | | | debian-installer [12] | Rebuild against oldstable-proposed- | | | updates; update kernel ABI to -20 | | | | | debian-installer- | Rebuild against oldstable-proposed- | | netboot-images [13] | updates | | | | | detox [14] | Fix processing of large files on ARM | | | architectures | | | | | evolution-data- | Fix crash on malformed server reponse | | server [15] | [CVE-2020-16117] | | | | | flac [16] | Fix out of bounds read issue [CVE-2020- | | | 0499] | | | | | gerbv [17] | Fix code execution issue [CVE-2021- | | | 40391] | | | | | glibc [18] | Import several fixes from upstream's | | | stable branch; simplify the check for | | | supported kernel versions, as 2.x | | | kernels are no longer supported; support | | | installation on kernels with a release | | | number greater than 255 | | | | | gmp [19] | Fix integer and buffer overflow issue | | | [CVE-2021-43618] | | | | | graphicsmagick [20] | Fix buffer overflow issue [CVE-2020- | | | 12672] | | | | | htmldoc [21] | Fix out-of-bounds read issue [CVE-2022- | | | 0534], buffer overflow issues [CVE-2021- | | | 43579 CVE-2021-40985] | | | | | http-parser [22] | Resolve inadvertent ABI break | | | | | icu [23] | Fix "pkgdata" utility | | | | | intel-microcode [24] | Update included microcode; mitigate some | | | security issues [CVE-2020-8694 CVE-2020- | | | 8695 CVE-2021-0127 CVE-2021-0145 | | | CVE-2021-0146 CVE-2021-33120] | | | | | jbig2dec [25] | Fix buffer overflow issue [CVE-2020- | | | 12268] | | | | | jtharness [26] | New upstream version to support builds | | | of newer OpenJDK-11 versions | | | | | jtreg [27] | New upstream version to support builds | | | of newer OpenJDK-11 versions | | | | | lemonldap-ng [28] | Fix auth process in password-testing | | | plugins [CVE-2021-20874]; add recommends | | | on gsfonts, fixing captcha | | | | | leptonlib [29] | Fix denial of service issue [CVE-2020- | | | 36277], buffer over-read issues | | | [CVE-2020-36278 CVE-2020-36279 CVE-2020- | | | 36280 CVE-2020-36281] | | | | | libdatetime-timezone- | Update included data | | perl [30] | | | | | | libencode-perl [31] | Fix a memory leak in Encode.xs | | | | | libetpan [32] | Fix STARTTLS response injection issue | | | [CVE-2020-15953] | | | | | libextractor [33] | Fix invalid read issue [CVE-2019-15531] | | | | | libjackson-json- | Fix code execution issues [CVE-2017- | | java [34] | 15095 CVE-2017-7525], XML external | | | entity issues [CVE-2019-10172] | | | | | libmodbus [35] | Fix out of bound read issues [CVE-2019- | | | 14462 CVE-2019-14463] | | | | | libpcap [36] | Check PHB header length before using it | | | to allocate memory [CVE-2019-15165] | | | | | libsdl1.2 [37] | Properly handle input focus events; fix | | | buffer overflow issues [CVE-2019-13616 | | | CVE-2019-7637], buffer over-read issues | | | [CVE-2019-7572 CVE-2019-7573 CVE-2019- | | | 7574 CVE-2019-7575 CVE-2019-7576 | | | CVE-2019-7577 CVE-2019-7578 CVE-2019- | | | 7635 CVE-2019-7636 CVE-2019-7638] | | | | | libxml2 [38] | Fix use-after-free issue [CVE-2022- | | | 23308] | | | | | linux [39] | New upstream stable release; [rt] Update | | | to 4.19.233-rt105; increase ABI to 20 | | | | | linux-latest [40] | Update to 4.19.0-20 ABI | | | | | linux-signed-amd64 [41] | New upstream stable release; [rt] Update | | | to 4.19.233-rt105; increase ABI to 20 | | | | | linux-signed-arm64 [42] | New upstream stable release; [rt] Update | | | to 4.19.233-rt105; increase ABI to 20 | | | | | linux-signed-i386 [43] | New upstream stable release; [rt] Update | | | to 4.19.233-rt105; increase ABI to 20 | | | | | llvm-toolchain-11 [44] | New package, backported from Debian 11, | | | to help build new rust versions | | | | | lxcfs [45] | Fix misreporting of swap usage | | | | | mailman [46] | Fix cross-site scripting issue | | | [CVE-2021-43331]; fix "a list moderator | | | can crack the list admin password | | | encrypted in a CSRF token" [CVE-2021- | | | 43332]; fix potential CSRF attack | | | against a list admin from a list member | | | or moderator [CVE-2021-44227]; fix | | | regressions in fixes for CVE-2021-42097 | | | and CVE-2021-44227 | | | | | mariadb-10.3 [47] | New upstream stable release; security | | | fixes [CVE-2021-35604 CVE-2021-46659 | | | CVE-2021-46661 CVE-2021-46662 CVE-2021- | | | 46663 CVE-2021-46664 CVE-2021-46665 | | | CVE-2021-46667 CVE-2021-46668 CVE-2022- | | | 24048 CVE-2022-24050 CVE-2022-24051 | | | CVE-2022-24052] | | | | | node-getobject [48] | Fix prototype pollution issue [CVE-2020- | | | 28282] | | | | | opensc [49] | Fix out-of-bounds access issues | | | [CVE-2019-15945 CVE-2019-15946], crash | | | due to read of unknown memory [CVE-2019- | | | 19479], double free issue [CVE-2019- | | | 20792], buffer overflow issues | | | [CVE-2020-26570 CVE-2020-26571 CVE-2020- | | | 26572] | | | | | openscad [50] | Fix buffer overflows in STL parser | | | [CVE-2020-28599 CVE-2020-28600] | | | | | openssl [51] | New upstream release | | | | | php-illuminate- | Fix query binding issue [CVE-2021- | | database [52] | 21263], SQL injection issue when used | | | with Microsoft SQL Server | | | | | phpliteadmin [53] | Fix cross-site scripting issue | | | [CVE-2021-46709] | | | | | plib [54] | Fix integer overflow issue [CVE-2021- | | | 38714] | | | | | privoxy [55] | Fix memory leak [CVE-2021-44540] and | | | cross-site scripting issue [CVE-2021- | | | 44543] | | | | | publicsuffix [56] | Update included data | | | | | python-virtualenv [57] | Avoid attempting to install | | | pkg_resources from PyPI | | | | | raptor2 [58] | Fix out of bounds array access issue | | | [CVE-2020-25713] | | | | | ros-ros-comm [59] | Fix denial of service issue [CVE-2021- | | | 37146] | | | | | rsyslog [60] | Fix heap overflow issues [CVE-2019-17041 | | | CVE-2019-17042] | | | | | ruby-httpclient [61] | Use system certificate store | | | | | rust-cbindgen [62] | New upstream stable release to support | | | builds of newer firefox-esr and | | | thunderbird versions | | | | | rustc-mozilla [63] | New source package to support building | | | of newer firefox-esr and thunderbird | | | versions | | | | | s390-dasd [64] | Stop passing deprecated -f option to | | | dasdfmt | | | | | spip [65] | Fix cross-site scripting issue | | | | | tzdata [66] | Update data for Fiji and Palestine | | | | | vim [67] | Fix ability to execute code while in | | | restricted mode [CVE-2019-20807], buffer | | | overflow issues [CVE-2021-3770 CVE-2021- | | | 3778 CVE-2021-3875], use after free | | | issue [CVE-2021-3796]; remove | | | accidentally included patch | | | | | wavpack [68] | Fix use of uninitialized values | | | [CVE-2019-1010317 CVE-2019-1010319] | | | | | weechat [69] | Fix several denial of service issues | | | [CVE-2020-8955 CVE-2020-9759 CVE-2020- | | | 9760 CVE-2021-40516] | | | | | wireshark [70] | Fix several security issues in | | | dissectors [CVE-2021-22207 CVE-2021- | | | 22235 CVE-2021-39921 CVE-2021-39922 | | | CVE-2021-39923 CVE-2021-39924 CVE-2021- | | | 39928 CVE-2021-39929] | | | | | xterm [71] | Fix buffer overflow issue [CVE-2022- | | | 24130] | | | | | zziplib [72] | Fix denial of service issue [CVE-2020- | | | 18442] | | | | +--------------------------+------------------------------------------+ 1: https://packages.debian.org/src:apache-log4j1.2 2: https://packages.debian.org/src:apache-log4j2 3: https://packages.debian.org/src:atftp 4: https://packages.debian.org/src:base-files 5: https://packages.debian.org/src:beads 6: https://packages.debian.org/src:btrbk 7: https://packages.debian.org/src:cargo-mozilla 8: https://packages.debian.org/src:chrony 9: https://packages.debian.org/src:cimg 10: https://packages.debian.org/src:clamav 11: https://packages.debian.org/src:cups 12: https://packages.debian.org/src:debian-installer 13: https://packages.debian.org/src:debian-installer-netboot-images 14: https://packages.debian.org/src:detox 15: https://packages.debian.org/src:evolution-data-server 16: https://packages.debian.org/src:flac 17: https://packages.debian.org/src:gerbv 18: https://packages.debian.org/src:glibc 19: https://packages.debian.org/src:gmp 20: https://packages.debian.org/src:graphicsmagick 21: https://packages.debian.org/src:htmldoc 22: https://packages.debian.org/src:http-parser 23: https://packages.debian.org/src:icu 24: https://packages.debian.org/src:intel-microcode 25: https://packages.debian.org/src:jbig2dec 26: https://packages.debian.org/src:jtharness 27: https://packages.debian.org/src:jtreg 28: https://packages.debian.org/src:lemonldap-ng 29: https://packages.debian.org/src:leptonlib 30: https://packages.debian.org/src:libdatetime-timezone-perl 31: https://packages.debian.org/src:libencode-perl 32: https://packages.debian.org/src:libetpan 33: https://packages.debian.org/src:libextractor 34: https://packages.debian.org/src:libjackson-json-java 35: https://packages.debian.org/src:libmodbus 36: https://packages.debian.org/src:libpcap 37: https://packages.debian.org/src:libsdl1.2 38: https://packages.debian.org/src:libxml2 39: https://packages.debian.org/src:linux 40: https://packages.debian.org/src:linux-latest 41: https://packages.debian.org/src:linux-signed-amd64 42: https://packages.debian.org/src:linux-signed-arm64 43: https://packages.debian.org/src:linux-signed-i386 44: https://packages.debian.org/src:llvm-toolchain-11 45: https://packages.debian.org/src:lxcfs 46: https://packages.debian.org/src:mailman 47: https://packages.debian.org/src:mariadb-10.3 48: https://packages.debian.org/src:node-getobject 49: https://packages.debian.org/src:opensc 50: https://packages.debian.org/src:openscad 51: https://packages.debian.org/src:openssl 52: https://packages.debian.org/src:php-illuminate-database 53: https://packages.debian.org/src:phpliteadmin 54: https://packages.debian.org/src:plib 55: https://packages.debian.org/src:privoxy 56: https://packages.debian.org/src:publicsuffix 57: https://packages.debian.org/src:python-virtualenv 58: https://packages.debian.org/src:raptor2 59: https://packages.debian.org/src:ros-ros-comm 60: https://packages.debian.org/src:rsyslog 61: https://packages.debian.org/src:ruby-httpclient 62: https://packages.debian.org/src:rust-cbindgen 63: https://packages.debian.org/src:rustc-mozilla 64: https://packages.debian.org/src:s390-dasd 65: https://packages.debian.org/src:spip 66: https://packages.debian.org/src:tzdata 67: https://packages.debian.org/src:vim 68: https://packages.debian.org/src:wavpack 69: https://packages.debian.org/src:weechat 70: https://packages.debian.org/src:wireshark 71: https://packages.debian.org/src:xterm 72: https://packages.debian.org/src:zziplib Security Updates ---------------- This revision adds the following security updates to the oldstable release. The Security Team has already released an advisory for each of these updates: +----------------+----------------------------+ | Advisory ID | Package | +----------------+----------------------------+ | DSA-4513 [73] | samba [74] | | | | | DSA-4982 [75] | apache2 [76] | | | | | DSA-4983 [77] | neutron [78] | | | | | DSA-4985 [79] | wordpress [80] | | | | | DSA-4986 [81] | tomcat9 [82] | | | | | DSA-4987 [83] | squashfs-tools [84] | | | | | DSA-4989 [85] | strongswan [86] | | | | | DSA-4990 [87] | ffmpeg [88] | | | | | DSA-4991 [89] | mailman [90] | | | | | DSA-4993 [91] | php7.3 [92] | | | | | DSA-4994 [93] | bind9 [94] | | | | | DSA-4995 [95] | webkit2gtk [96] | | | | | DSA-4997 [97] | tiff [98] | | | | | DSA-5000 [99] | openjdk-11 [100] | | | | | DSA-5001 [101] | redis [102] | | | | | DSA-5004 [103] | libxstream-java [104] | | | | | DSA-5005 [105] | ruby-kaminari [106] | | | | | DSA-5006 [107] | postgresql-11 [108] | | | | | DSA-5010 [109] | libxml-security-java [110] | | | | | DSA-5011 [111] | salt [112] | | | | | DSA-5013 [113] | roundcube [114] | | | | | DSA-5014 [115] | icu [116] | | | | | DSA-5015 [117] | samba [118] | | | | | DSA-5016 [119] | nss [120] | | | | | DSA-5018 [121] | python-babel [122] | | | | | DSA-5019 [123] | wireshark [124] | | | | | DSA-5020 [125] | apache-log4j2 [126] | | | | | DSA-5021 [127] | mediawiki [128] | | | | | DSA-5022 [129] | apache-log4j2 [130] | | | | | DSA-5023 [131] | modsecurity-apache [132] | | | | | DSA-5024 [133] | apache-log4j2 [134] | | | | | DSA-5027 [135] | xorg-server [136] | | | | | DSA-5028 [137] | spip [138] | | | | | DSA-5029 [139] | sogo [140] | | | | | DSA-5030 [141] | webkit2gtk [142] | | | | | DSA-5032 [143] | djvulibre [144] | | | | | DSA-5035 [145] | apache2 [146] | | | | | DSA-5036 [147] | sphinxsearch [148] | | | | | DSA-5037 [149] | roundcube [150] | | | | | DSA-5038 [151] | ghostscript [152] | | | | | DSA-5039 [153] | wordpress [154] | | | | | DSA-5040 [155] | lighttpd [156] | | | | | DSA-5043 [157] | lxml [158] | | | | | DSA-5047 [159] | prosody [160] | | | | | DSA-5051 [161] | aide [162] | | | | | DSA-5052 [163] | usbview [164] | | | | | DSA-5053 [165] | pillow [166] | | | | | DSA-5056 [167] | strongswan [168] | | | | | DSA-5057 [169] | openjdk-11 [170] | | | | | DSA-5059 [171] | policykit-1 [172] | | | | | DSA-5060 [173] | webkit2gtk [174] | | | | | DSA-5062 [175] | nss [176] | | | | | DSA-5063 [177] | uriparser [178] | | | | | DSA-5065 [179] | ipython [180] | | | | | DSA-5066 [181] | ruby2.5 [182] | | | | | DSA-5071 [183] | samba [184] | | | | | DSA-5072 [185] | debian-edu-config [186] | | | | | DSA-5073 [187] | expat [188] | | | | | DSA-5075 [189] | minetest [190] | | | | | DSA-5076 [191] | h2database [192] | | | | | DSA-5078 [193] | zsh [194] | | | | | DSA-5081 [195] | redis [196] | | | | | DSA-5083 [197] | webkit2gtk [198] | | | | | DSA-5085 [199] | expat [200] | | | | | DSA-5087 [201] | cyrus-sasl2 [202] | | | | | DSA-5088 [203] | varnish [204] | | | | | DSA-5093 [205] | spip [206] | | | | | DSA-5096 [207] | linux-latest [208] | | | | | DSA-5096 [209] | linux-signed-amd64 [210] | | | | | DSA-5096 [211] | linux-signed-arm64 [212] | | | | | DSA-5096 [213] | linux-signed-i386 [214] | | | | | DSA-5096 [215] | linux [216] | | | | | DSA-5098 [217] | tryton-server [218] | | | | | DSA-5099 [219] | tryton-proteus [220] | | | | | DSA-5100 [221] | nbd [222] | | | | | DSA-5101 [223] | libphp-adodb [224] | | | | | DSA-5103 [225] | openssl [226] | | | | | DSA-5105 [227] | bind9 [228] | | | | +----------------+----------------------------+ 73: https://www.debian.org/security/2019/dsa-4513 74: https://packages.debian.org/src:samba 75: https://www.debian.org/security/2021/dsa-4982 76: https://packages.debian.org/src:apache2 77: https://www.debian.org/security/2021/dsa-4983 78: https://packages.debian.org/src:neutron 79: https://www.debian.org/security/2021/dsa-4985 80: https://packages.debian.org/src:wordpress 81: https://www.debian.org/security/2021/dsa-4986 82: https://packages.debian.org/src:tomcat9 83: https://www.debian.org/security/2021/dsa-4987 84: https://packages.debian.org/src:squashfs-tools 85: https://www.debian.org/security/2021/dsa-4989 86: https://packages.debian.org/src:strongswan 87: https://www.debian.org/security/2021/dsa-4990 88: https://packages.debian.org/src:ffmpeg 89: https://www.debian.org/security/2021/dsa-4991 90: https://packages.debian.org/src:mailman 91: https://www.debian.org/security/2021/dsa-4993 92: https://packages.debian.org/src:php7.3 93: https://www.debian.org/security/2021/dsa-4994 94: https://packages.debian.org/src:bind9 95: https://www.debian.org/security/2021/dsa-4995 96: https://packages.debian.org/src:webkit2gtk 97: https://www.debian.org/security/2021/dsa-4997 98: https://packages.debian.org/src:tiff 99: https://www.debian.org/security/2021/dsa-5000 100: https://packages.debian.org/src:openjdk-11 101: https://www.debian.org/security/2021/dsa-5001 102: https://packages.debian.org/src:redis 103: https://www.debian.org/security/2021/dsa-5004 104: https://packages.debian.org/src:libxstream-java 105: https://www.debian.org/security/2021/dsa-5005 106: https://packages.debian.org/src:ruby-kaminari 107: https://www.debian.org/security/2021/dsa-5006 108: https://packages.debian.org/src:postgresql-11 109: https://www.debian.org/security/2021/dsa-5010 110: https://packages.debian.org/src:libxml-security-java 111: https://www.debian.org/security/2021/dsa-5011 112: https://packages.debian.org/src:salt 113: https://www.debian.org/security/2021/dsa-5013 114: https://packages.debian.org/src:roundcube 115: https://www.debian.org/security/2021/dsa-5014 116: https://packages.debian.org/src:icu 117: https://www.debian.org/security/2021/dsa-5015 118: https://packages.debian.org/src:samba 119: https://www.debian.org/security/2021/dsa-5016 120: https://packages.debian.org/src:nss 121: https://www.debian.org/security/2021/dsa-5018 122: https://packages.debian.org/src:python-babel 123: https://www.debian.org/security/2021/dsa-5019 124: https://packages.debian.org/src:wireshark 125: https://www.debian.org/security/2021/dsa-5020 126: https://packages.debian.org/src:apache-log4j2 127: https://www.debian.org/security/2021/dsa-5021 128: https://packages.debian.org/src:mediawiki 129: https://www.debian.org/security/2021/dsa-5022 130: https://packages.debian.org/src:apache-log4j2 131: https://www.debian.org/security/2021/dsa-5023 132: https://packages.debian.org/src:modsecurity-apache 133: https://www.debian.org/security/2021/dsa-5024 134: https://packages.debian.org/src:apache-log4j2 135: https://www.debian.org/security/2021/dsa-5027 136: https://packages.debian.org/src:xorg-server 137: https://www.debian.org/security/2021/dsa-5028 138: https://packages.debian.org/src:spip 139: https://www.debian.org/security/2021/dsa-5029 140: https://packages.debian.org/src:sogo 141: https://www.debian.org/security/2021/dsa-5030 142: https://packages.debian.org/src:webkit2gtk 143: https://www.debian.org/security/2021/dsa-5032 144: https://packages.debian.org/src:djvulibre 145: https://www.debian.org/security/2022/dsa-5035 146: https://packages.debian.org/src:apache2 147: https://www.debian.org/security/2022/dsa-5036 148: https://packages.debian.org/src:sphinxsearch 149: https://www.debian.org/security/2022/dsa-5037 150: https://packages.debian.org/src:roundcube 151: https://www.debian.org/security/2022/dsa-5038 152: https://packages.debian.org/src:ghostscript 153: https://www.debian.org/security/2022/dsa-5039 154: https://packages.debian.org/src:wordpress 155: https://www.debian.org/security/2022/dsa-5040 156: https://packages.debian.org/src:lighttpd 157: https://www.debian.org/security/2022/dsa-5043 158: https://packages.debian.org/src:lxml 159: https://www.debian.org/security/2022/dsa-5047 160: https://packages.debian.org/src:prosody 161: https://www.debian.org/security/2022/dsa-5051 162: https://packages.debian.org/src:aide 163: https://www.debian.org/security/2022/dsa-5052 164: https://packages.debian.org/src:usbview 165: https://www.debian.org/security/2022/dsa-5053 166: https://packages.debian.org/src:pillow 167: https://www.debian.org/security/2022/dsa-5056 168: https://packages.debian.org/src:strongswan 169: https://www.debian.org/security/2022/dsa-5057 170: https://packages.debian.org/src:openjdk-11 171: https://www.debian.org/security/2022/dsa-5059 172: https://packages.debian.org/src:policykit-1 173: https://www.debian.org/security/2022/dsa-5060 174: https://packages.debian.org/src:webkit2gtk 175: https://www.debian.org/security/2022/dsa-5062 176: https://packages.debian.org/src:nss 177: https://www.debian.org/security/2022/dsa-5063 178: https://packages.debian.org/src:uriparser 179: https://www.debian.org/security/2022/dsa-5065 180: https://packages.debian.org/src:ipython 181: https://www.debian.org/security/2022/dsa-5066 182: https://packages.debian.org/src:ruby2.5 183: https://www.debian.org/security/2022/dsa-5071 184: https://packages.debian.org/src:samba 185: https://www.debian.org/security/2022/dsa-5072 186: https://packages.debian.org/src:debian-edu-config 187: https://www.debian.org/security/2022/dsa-5073 188: https://packages.debian.org/src:expat 189: https://www.debian.org/security/2022/dsa-5075 190: https://packages.debian.org/src:minetest 191: https://www.debian.org/security/2022/dsa-5076 192: https://packages.debian.org/src:h2database 193: https://www.debian.org/security/2022/dsa-5078 194: https://packages.debian.org/src:zsh 195: https://www.debian.org/security/2022/dsa-5081 196: https://packages.debian.org/src:redis 197: https://www.debian.org/security/2022/dsa-5083 198: https://packages.debian.org/src:webkit2gtk 199: https://www.debian.org/security/2022/dsa-5085 200: https://packages.debian.org/src:expat 201: https://www.debian.org/security/2022/dsa-5087 202: https://packages.debian.org/src:cyrus-sasl2 203: https://www.debian.org/security/2022/dsa-5088 204: https://packages.debian.org/src:varnish 205: https://www.debian.org/security/2022/dsa-5093 206: https://packages.debian.org/src:spip 207: https://www.debian.org/security/2022/dsa-5096 208: https://packages.debian.org/src:linux-latest 209: https://www.debian.org/security/2022/dsa-5096 210: https://packages.debian.org/src:linux-signed-amd64 211: https://www.debian.org/security/2022/dsa-5096 212: https://packages.debian.org/src:linux-signed-arm64 213: https://www.debian.org/security/2022/dsa-5096 214: https://packages.debian.org/src:linux-signed-i386 215: https://www.debian.org/security/2022/dsa-5096 216: https://packages.debian.org/src:linux 217: https://www.debian.org/security/2022/dsa-5098 218: https://packages.debian.org/src:tryton-server 219: https://www.debian.org/security/2022/dsa-5099 220: https://packages.debian.org/src:tryton-proteus 221: https://www.debian.org/security/2022/dsa-5100 222: https://packages.debian.org/src:nbd 223: https://www.debian.org/security/2022/dsa-5101 224: https://packages.debian.org/src:libphp-adodb 225: https://www.debian.org/security/2022/dsa-5103 226: https://packages.debian.org/src:openssl 227: https://www.debian.org/security/2022/dsa-5105 228: https://packages.debian.org/src:bind9 Removed packages ---------------- The following packages were removed due to circumstances beyond our control: +----------------------------+------------------+ | Package | Reason | +----------------------------+------------------+ | angular-maven-plugin [229] | No longer useful | | | | | minify-maven-plugin [230] | No longer useful | | | | +----------------------------+------------------+ 229: https://packages.debian.org/src:angular-maven-plugin 230: https://packages.debian.org/src:minify-maven-plugin Debian Installer ---------------- The installer has been updated to include the fixes incorporated into oldstable by the point release. URLs ---- The complete lists of packages that have changed with this revision: https://deb.debian.org/debian/dists/buster/ChangeLog The current oldstable distribution: https://deb.debian.org/debian/dists/oldstable/ Proposed updates to the oldstable distribution: https://deb.debian.org/debian/dists/oldstable-proposed-updates oldstable distribution information (release notes, errata etc.): https://www.debian.org/releases/oldstable/ Security announcements and information: https://www.debian.org/security/ About Debian ------------ The Debian Project is an association of Free Software developers who volunteer their time and effort in order to produce the completely free operating system Debian. Contact Information ------------------- For further information, please visit the Debian web pages at https://www.debian.org/, send mail to <[email protected]>, or contact the stable release team at <[email protected]>.

