Atualização Debian 12: 12.6 lançado

29 de Junho de 2024

O projeto Debian está feliz em anunciar a sexta atualização de sua versão estável (stable) do Debian 12 (codinome bookworm). Esta versão pontual adiciona principalmente correções para problemas de segurança, além de pequenos ajustes para problemas mais sérios. Avisos de segurança já foram publicados em separado e são referenciados quando necessário.

Por favor, note que a versão pontual não constitui uma nova versão do Debian 12, mas apenas atualiza alguns dos pacotes já incluídos. Não há necessidade de jogar fora as antigas mídias do bookworm. Após a instalação, os pacotes podem ser atualizados para as versões atuais usando um espelho atualizado do Debian.

Aquelas pessoas que frequentemente instalam atualizações a partir de security.debian.org não terão que atualizar muitos pacotes, e a maioria de tais atualizações estão incluídas na versão pontual.

Novas imagens de instalação logo estarão disponíveis nos locais habituais.

A atualização de uma instalação existente para esta revisão pode ser feita apontando o sistema de gerenciamento de pacotes para um dos muitos espelhos HTTP do Debian. Uma lista abrangente de espelhos está disponível em:

https://www.debian.org/mirror/list

Correções gerais de bugs

Esta atualização da versão estável (stable) adiciona algumas correções importantes para os seguintes pacotes:

Pacote Justificativa
aide Fix concurrent reading of extended attributes
amavisd-new Handle multiple boundary parameters that contain conflicting values [CVE-2024-28054]; fix race condition in postinst
archlinux-keyring Switch to pre-built keyrings; sync with upstream
base-files Update for the 12.6 point release
bash Rebuild to fix outdated Built-Using
bioawk Disable parallel builds to fix random failures
bluez Fix remote code execution issues [CVE-2023-27349 CVE-2023-50229 CVE-2023-50230]
cdo Disable hirlam-extensions to avoid causing issues with ICON data files
chkrootkit Rebuild to fix outdated Built-Using
cjson Fix missing NULL checks [CVE-2023-50471 CVE-2023-50472]
clamav New upstream stable release; fix possible heap overflow issue [CVE-2024-20290], possible command injection issue [CVE-2024-20328]
cloud-init Declare conflicts/replaces on versioned package introduced for bullseye
comitup Ensure service is unmasked in post install
cpu Provide exactly one definition of globalLdap in LDAP plugin
crmsh Create log directory and file on installation
crowdsec-custom-bouncer Rebuild to fix outdated Built-Using
crowdsec-firewall-bouncer Rebuild against golang-github-google-nftables version with fixed little-endian architecture support
curl Do not keep default protocols when deselected [CVE-2024-2004]; fix memory leak [CVE-2024-2398]
dar Rebuild to fix outdated Built-Using
dcmtk Clean up properly on purge
debian-installer Increase Linux kernel ABI to 6.1.0-22; rebuild against proposed-updates
debian-installer-netboot-images Rebuild against proposed-updates
debvm debvm-create: do install login; bin/debvm-waitssh: make --timeout=N work; bin/debvm-run: allow being run in environments without TERM set; fix resolv.conf in stretch
dhcpcd5 privsep: Allow zero length messages through; fix server not being restarted correctly during upgrades
distro-info-data Declare intentions for bullseye/bookworm; fix past data; add Ubuntu 24.10
djangorestframework Reinstate missing static files
dm-writeboost Fix build error with 6.9 kernel and backports
dns-root-data Update root hints; update expired security information
dpdk New upstream stable release
ebook-speaker Support username over 8 characters when enumerating groups
emacs Security fixes [CVE-2024-30202 CVE-2024-30203 CVE-2024-30204 CVE-2024-30205]; replace expired package-keyring.gpg with a current version
extrepo-data Update repository information
flatpak New upstream stable release
fpga-icestorm Restore compatibility with yosys
freetype Disable COLRv1 support, which was unintentionally enabled by upstream; fix function existence check when calling get_colr_glyph_paint()
galera-4 New upstream bugfix release; update upstream release signing key; prevent date-related test failures
gdk-pixbuf ANI: Reject files with multiple anih chunks [CVE-2022-48622]; ANI: Reject files with multiple INAM or IART chunks; ANI: Validate anih chunk size
glewlwyd Fix potential buffer overflow during FIDO2 credential validation [CVE-2023-49208]; fix open redirection via redirect_uri [CVE-2024-25715]
glib2.0 Fix a (rare) memory leak
glibc Revert fix to always call destructors in reverse constructor order due to unforeseen application compatibility issues; fix a DTV corruption due to a reuse of a TLS module ID following dlclose with unused TLS
gnutls28 Fix certtool crash when verifying a certificate chain with more than 16 certificates [CVE-2024-28835]; fix side-channel in the deterministic ECDSA [CVE-2024-28834]; fix a memory leak; fix two segfault issues
golang-github-containers-storage Rebuild for outdated Built-Using
golang-github-google-nftables Fix AddSet() function on little-endian architectures
golang-github-openshift-imagebuilder Rebuild for outdated Built-Using
gosu Rebuild for outdated Built-Using
gpaste Fix conflict with older libpgpaste6
gross Fix stack-based buffer overflow [CVE-2023-52159]
hovercraft Depend on python3-setuptools
icinga2 Fix segmentation fault on ppc64el
igtf-policy-bundle Address CAB Forum S/MIME policy change; apply accumulated updates to trust anchors
intel-microcode Security mitigations [CVE-2023-22655 CVE-2023-28746 CVE-2023-38575 CVE-2023-39368 CVE-2023-43490]; mitigate for INTEL-SA-01051 [CVE-2023-45733], INTEL-SA-01052 [CVE-2023-46103], INTEL-SA-01036 [CVE-2023-45745, CVE-2023-47855] and unspecified functional issues on various Intel processors
jose Fix potential denial-of-service issue [CVE-2023-50967]
json-smart Fix excessive recursion leading to stack overflow [CVE-2023-1370]; fix denial of service via crafted request [CVE-2021-31684]
kio Fix file loss and potential locking issues on CIFS
lacme Fix post-issuance validation logic
libapache2-mod-auth-openidc Fix mising input validation leading to DoS [CVE-2024-24814]
libesmtp Break and replace older library versions
libimage-imlib2-perl Fix package build
libjwt Fix timing side channel attack [CVE-2024-25189]
libkf5ksieve Prevent leaking passwords into server-side logs
libmail-dkim-perl Add dependency on libgetopt-long-descriptive-perl
libpod Handle removed containers properly
libreoffice Fix backup copy creation for files on mounted samba shares; don't remove libforuilo.so in -core-nogui
libseccomp Add support for syscalls up to Linux 6.7
libtommath Fix integer overflow [CVE-2023-36328]
libtool Conflict with libltdl3-dev; fix check for += operator in func_append
libxml-stream-perl Fix compatibility with IO::Socket::SSL >= 2.078
linux New upstream stable release; increase ABI to 22
linux-signed-amd64 New upstream stable release; increase ABI to 22
linux-signed-arm64 New upstream stable release; increase ABI to 22
linux-signed-i386 New upstream stable release; increase ABI to 22
lua5.4 debian/version-script: Export additional missing symbols for lua 5.4.4
lxc-templates Fix the mirror option of lxc-debian
mailman3 Depend alternatively on cron-daemon; fix postgresql:// url in post-installation script
mksh Handle merged /usr in /etc/shells; fix crash with nested bashism; fix arguments to the dot command; distinguish unset and empty in `typeset -p`
mobian-keyring Update Mobian archive key
ms-gsl Mark not_null constructors as noexcept
nano Fix format string issues; fix with --cutfromcursor, undoing a justification can eat a line; fix malicious symlink issue; fix example bindings in nanorc
netcfg Handle routing for single-address netmasks
ngircd Respect SSLConnect option for incoming connections; server certificate validation on server links (S2S-TLS); METADATA: Fix unsetting cloakhost
node-babel7 Fix building against nodejs 18.19.0+dfsg-6~deb12u1; add Breaks/Replaces against obsolete node-babel-* packages
node-undici Properly export typescript types
node-v8-compile-cache Fix tests when a newer nodejs version is used
node-zx Fix flaky test
nodejs Skip flaky tests for mipsel/mips64el
nsis Don't allow unprivileged users to delete the uninstaller directory [CVE-2023-37378]; fix regression in disabling stub relocations; build reproducibly for arm64
nvidia-graphics-drivers Restore compatibility with newer Linux kernel builds; take over packages from nvidia-graphics-drivers-tesla; add new nvidia-suspend-common package; relax dh-dkms build-dependency for compatibility with bookworm; new upstream stable release [CVE-2023-0180 CVE-2023-0183 CVE-2023-0184 CVE-2023-0185 CVE-2023-0187 CVE-2023-0188 CVE-2023-0189 CVE-2023-0190 CVE-2023-0191 CVE-2023-0194 CVE-2023-0195 CVE-2023-0198 CVE-2023-0199 CVE-2023-25515 CVE-2023-25516 CVE-2023-31022 CVE-2024-0074 CVE-2024-0075 CVE-2024-0078 CVE-2024-0090 CVE-2024-0092]
nvidia-graphics-drivers-tesla Restore compatibility with newer Linux kernel builds
nvidia-graphics-drivers-tesla-470 Restore compatibility with newer Linux kernel builds; stop building nvidia-cuda-mps; new upstream stable release; security fixes [CVE-2022-42265 CVE-2024-0074 CVE-2024-0078 CVE-2024-0090 CVE-2024-0092]
nvidia-modprobe Prepare to switch to 535 series LTS drivers
nvidia-open-gpu-kernel-modules Update to 535 series LTS drivers [CVE-2023-0180 CVE-2023-0183 CVE-2023-0184 CVE-2023-0185 CVE-2023-0187 CVE-2023-0188 CVE-2023-0189 CVE-2023-0190 CVE-2023-0191 CVE-2023-0194 CVE-2023-0195 CVE-2023-0198 CVE-2023-0199 CVE-2023-25515 CVE-2023-25516 CVE-2023-31022 CVE-2024-0074 CVE-2024-0075 CVE-2024-0078 CVE-2024-0090 CVE-2024-0092]
nvidia-persistenced Switch to 535 series LTS drivers; update list of supported drivers
nvidia-settings Also build for ppc64el; new upstream LTS release
nvidia-xconfig New upstream LTS release
openrc Ignore non-executable scripts in /etc/init.d
openssl New upstream stable release; fix excessive time taken issues [CVE-2023-5678 CVE-2023-6237], vector register corruption issue on PowerPC [CVE-2023-6129], PKCS12 Decoding crashes [CVE-2024-0727]
openvpn-dco-dkms Build for Linux >= 6.5; install compat-include directory; fix refcount imbalance
orthanc-dicomweb Rebuild to fix outdated Built-Using
orthanc-gdcm Rebuild to fix outdated Built-Using
orthanc-mysql Rebuild to fix outdated Built-Using
orthanc-neuro Rebuild to fix outdated Built-Using
orthanc-postgresql Rebuild to fix outdated Built-Using
orthanc-python Rebuild to fix outdated Built-Using
orthanc-webviewer Rebuild to fix outdated Built-Using
orthanc-wsi Rebuild to fix outdated Built-Using
ovn New upstream stable version; fix insufficient validation of incoming BFD packets [CVE-2024-2182]
pdudaemon Depend on python3-aiohttp
php-composer-class-map-generator Force system dependency loading
php-composer-pcre Add missing Breaks+Replaces: on composer (<< 2.2)
php-composer-xdebug-handler Force system dependency loading
php-doctrine-annotations Force system dependency loading
php-doctrine-deprecations Force system dependency loading
php-doctrine-lexer Force system dependency loading
php-phpseclib Guard isPrime() and randomPrime() for BigInteger [CVE-2024-27354]; limit OID length in ASN1 [CVE-2024-27355]; fix BigInteger getLength(); remove visibitility modifiers from static variables
php-phpseclib3 Force system dependency loading; guard isPrime() and randomPrime() for BigInteger [CVE-2024-27354]; limit OID length in ASN1 [CVE-2024-27355]; fix BigInteger getLength()
php-proxy-manager Force system dependency loading
php-symfony-contracts Force system dependency loading
php-zend-code Force system dependency loading
phpldapadmin Fix compatbility with PHP 8.1+
phpseclib Force system dependency loading; guard isPrime() and randomPrime() for BigInteger [CVE-2024-27354]; limit OID length in ASN1 [CVE-2024-27355]; fix BigInteger getLength()
postfix New upstream stable release
postgresql-15 New upstream stable release; restrict visibility of pg_stats_ext and pg_stats_ext_exprs entries to the table owner [CVE-2024-4317]
prometheus-node-exporter-collectors Do not adversely affect mirror network; fix deadlock with other apt update runs
pymongo Fix out-of-bounds read issue [CVE-2024-5629]
pypy3 Strip C0 control and space characters in urlsplit [CVE-2023-24329]; avoid bypass of TLS handshake protections on closed sockets [CVE-2023-40217]; tempfile.TemporaryDirectory: fix symlink bug in cleanup [CVE-2023-6597]; protect zipfile from quoted-overlap zipbomb [CVE-2024-0450]
python-aiosmtpd Fix SMTP smuggling issue [CVE-2024-27305]; fix STARTTLS unencrypted command injection issue [CVE-2024-34083]
python-asdf Remove unnecessary dependency on asdf-unit-schemas
python-channels-redis Ensure pools are closed on loop close in core
python-idna Fix denial of service issue [CVE-2024-3651]
python-jwcrypto Fix denial of service issue [CVE-2024-28102]
python-xapian-haystack Drop dependency on django.utils.six
python3.11 Fix use-after-free crash when deallocating a frame object; protect zipfile from quoted-overlap zipbomb [CVE-2024-0450]; tempfile.TemporaryDirectory: fix symlink bug in cleanup [CVE-2023-6597]; fix os.path.normpath(): Path truncation at null bytes [CVE-2023-41105]; avoid bypass of TLS handshake protections on closed sockets [CVE-2023-40217]; strip C0 control and space characters in urlsplit [CVE-2023-24329]; avoid a potential null pointer dereference in filleutils
qemu New upstream stable release; security fixes [CVE-2024-26327 CVE-2024-26328 CVE-2024-3446 CVE-2024-3447]
qtbase-opensource-src Fix regression in patch for CVE-2023-24607; avoid using system CA certificates when not wanted [CVE-2023-34410]; fix buffer overflow [CVE-2023-37369]; fix infinite loop in XML recursive entity expansion [CVE-2023-38197]; fix buffer overflow with crafted KTX image file [CVE-2024-25580]; fix HPack integer overflow check [CVE-2023-51714]
rails Declare breaks and replaces on obsolete ruby-arel package
riseup-vpn Use system certificate bundle by default, restoring ability to connect to an endpoint using LetsEncrypt certificate
ruby-aws-partitions Ensure binary package includes partitions.json and partitions-metadata.json files
ruby-premailer-rails Remove build-dependency on obsolete ruby-arel
rust-cbindgen-web New source package to support builds of newer Firefox ESR versions
rustc-web New source package to support builds of web browsers
schleuder Fix argument parsing insufficient validation; fix importing keys from attachments sent by Thunderbird and handle mails without further content; look for keywords only at the start of mail; validate downcased email addresses when checking subscribers; consider From header for finding reply addresses
sendmail Fix SMTP smuggling issue [CVE-2023-51765]
skeema Rebuild for outdated Built-Using
skopeo Rebuild for outdated Built-Using
software-properties software-properties-qt: Add Conflicts+Replaces: on software-properties-kde for smoother upgrades from bullseye
supermin Rebuild to fix outdated Built-Using
symfony Force system dependency loading; DateTypTest: ensure submitted year is accepted choice
systemd New upstream stable release; fix denial of service issues [CVE-2023-50387 CVE-2023-50868]; libnss-myhostname.nss: Install after files; libnss-mymachines.nss: Install before resolve and dns
termshark Rebuild to fix outdated Built-Using
tripwire Rebuild to fix outdated Built-Using
tryton-client Only send compressed content in authenticated sessions
tryton-server Prevent zip-bomb attacks from unauthenticated sources
u-boot Fix orion-timer for booting sheevaplug and related platforms
uif Support VLAN interface names
umoci Rebuild for outdated Built-Using
user-mode-linux Rebuilt to fix outdated Built-Using
wayfire Add missing dependencies
what-is-python Declare breaks and replaces on python-dev-is-python2; fix version mangling in build rules
wpa Fix authentication bypass issue [CVE-2023-52160]
xscreensaver Disable warning about old versions
yapet Do not call EVP_CIPHER_CTX_set_key_length() in crypt/blowfish and crypt/aes
zsh Rebuild to fix outdated Built-Using

Atualizações de segurança

Esta revisão adiciona as seguintes atualizações de segurança para a versão estável (stable). A equipe de segurança já lançou um aviso para cada uma dessas atualizações:

ID do aviso Pacote
DSA-5575 webkit2gtk
DSA-5580 webkit2gtk
DSA-5589 nodejs
DSA-5609 slurm-wlm-contrib
DSA-5616 ruby-sanitize
DSA-5618 webkit2gtk
DSA-5619 libgit2
DSA-5620 unbound
DSA-5621 bind9
DSA-5623 postgresql-15
DSA-5624 edk2
DSA-5625 engrampa
DSA-5626 pdns-recursor
DSA-5627 firefox-esr
DSA-5628 imagemagick
DSA-5630 thunderbird
DSA-5631 iwd
DSA-5632 composer
DSA-5633 knot-resolver
DSA-5635 yard
DSA-5637 squid
DSA-5638 libuv1
DSA-5640 openvswitch
DSA-5641 fontforge
DSA-5642 php-dompdf-svg-lib
DSA-5643 firefox-esr
DSA-5644 thunderbird
DSA-5645 firefox-esr
DSA-5646 cacti
DSA-5650 util-linux
DSA-5651 mediawiki
DSA-5653 gtkwave
DSA-5655 cockpit
DSA-5657 xorg-server
DSA-5658 linux-signed-amd64
DSA-5658 linux-signed-arm64
DSA-5658 linux-signed-i386
DSA-5658 linux
DSA-5659 trafficserver
DSA-5661 php8.2
DSA-5662 apache2
DSA-5663 firefox-esr
DSA-5664 jetty9
DSA-5665 tomcat10
DSA-5666 flatpak
DSA-5669 guix
DSA-5670 thunderbird
DSA-5672 openjdk-17
DSA-5673 glibc
DSA-5674 pdns-recursor
DSA-5677 ruby3.1
DSA-5678 glibc
DSA-5679 less
DSA-5680 linux-signed-amd64
DSA-5680 linux-signed-arm64
DSA-5680 linux-signed-i386
DSA-5680 linux
DSA-5682 glib2.0
DSA-5682 gnome-shell
DSA-5684 webkit2gtk
DSA-5685 wordpress
DSA-5686 dav1d
DSA-5688 atril
DSA-5690 libreoffice
DSA-5691 firefox-esr
DSA-5692 ghostscript
DSA-5693 thunderbird
DSA-5695 webkit2gtk
DSA-5698 ruby-rack
DSA-5699 redmine
DSA-5700 python-pymysql
DSA-5702 gst-plugins-base1.0
DSA-5704 pillow
DSA-5705 tinyproxy
DSA-5706 libarchive
DSA-5707 vlc
DSA-5708 cyrus-imapd
DSA-5709 firefox-esr
DSA-5711 thunderbird
DSA-5712 ffmpeg
DSA-5713 libndp
DSA-5714 roundcube
DSA-5715 composer
DSA-5717 php8.2

Pacotes removidos

Os seguintes pacotes foram removidos por circunstâncias fora de nosso controle:

Pacote Justificativa
phppgadmin Security issues; incompatible with bookworm's PostgreSQL version
pytest-salt-factories Only needed for salt, which is not part of bookworm
ruby-arel Obsolete, integrated into ruby-activerecord, incompatible with ruby-activerecord 6.1.x
spip Incompatible with bookworm's PHP version
vasttrafik-cli API withdrawn

Instalador do Debian

O instalador foi atualizado para incluir as correções incorporadas na versão estável (stable) pela versão pontual.

URLs

As listas completas dos pacotes que foram alterados por esta revisão:

https://deb.debian.org/debian/dists/bookworm/ChangeLog

A atual versão estável (stable):

https://deb.debian.org/debian/dists/stable/

Atualizações propostas (proposed updates) para a versão estável (stable):

https://deb.debian.org/debian/dists/proposed-updates

Informações da versão estável (stable) (notas de lançamento, errata, etc):

https://www.debian.org/releases/stable/

Anúncios de segurança e informações:

https://www.debian.org/security/

Sobre o Debian

O projeto Debian é uma associação de desenvolvedores(as) de Software Livre que dedicam seu tempo e esforço como voluntários(as) para produzir o sistema operacional completamente livre Debian.

Informações de contato

Para mais informações, por favor visite as páginas web do Debian em https://www.debian.org/, envie um e-mail (em inglês) para <[email protected]>, ou entre em contato (em inglês) com a equipe de lançamento da versão estável (stable) em <[email protected]>.