Raise the axfrdns, dnscache, and tinydns data limitįix missing SSL certificate validation issue Rebuild against proposed-updates update Linux kernel ABI to 5.10.0-13Īdd Debian Ports Archive Automatic Signing Key (2023) move the New upstream stable release fix denial of service issue Īpparmor: allow reading from Debian Edu's cups-browsed configuration fileįix undesired listening of workers on public interfaces fix compatibility with Python 3.9 New upstream release fix crash due to random memory read fix HTTP request smuggling issue fix out-of-bounds write issues įix information leak issue Īllow reading the chronyd configuration file that timemaster(8) generatesįix crash when adding an online account with login Resolve security issues, by removing support for the JMSSink, JDBCAppender, JMSAppender and Apache Chainsaw modulesįix remote code execution issue This stable update adds a few important corrections to the following packages: Package Pointing the package management system at one of Debian's many HTTP mirrors.Ī comprehensive list of mirrors is available at: Upgrading an existing installation to this revision can be achieved by New installation images will be available soon at the regular locations. ![]() To update many packages, and most such updates are Those who frequently install updates from won't have ![]() Packages can be upgraded to the current versions using an up-to-date Debian ![]() No need to throw away old bullseye media. Please note that the point release does not constitute a new version of Debianġ1 but only updates some of the packages included. Have already been published separately and are referenced where available. This point release mainly adds corrections for security issues,Īlong with a few adjustments for serious problems. Stable distribution Debian 11 (codename bullseye). The Debian project is pleased to announce the third update of its
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |