• [RFR] wml://www.debian.org/News/2024/20240629.wml

    From Carlos Henrique Lima Melara@21:1/5 to All on Sat Jun 29 20:10:01 2024
    --loxrrn3ghattqcdu
    Content-Type: text/plain; charset=utf-8
    Content-Disposition: inline
    Content-Transfer-Encoding: quoted-printable

    Boa tarde!

    Pessoal, hoje foi lançada as versões pontuais 12.6 e 11.10. Fiz uma tradução rápida utilizando a última tradução feita por nós. Não traduzi as descrições dos bugs porque não teria tempo este fim de semana (são sempre palavras intricadas e específicas da área), mas acho importante a gente ter a parte principal da notícia traduzida. Convido o(os/as) revisor(es/as) a sugerir a tradução caso tenham tempo. Também gostaria
    de verificar se concordam que eu suba essa primeira tradução antes da revisão por ser algo mais sensível ao tempo de publicação. Quando chegar
    a revisão, farei a atualização do arquivo.

    Abraços,
    Charles

    PS: em seguida vem a tradução do 11.10.

    --loxrrn3ghattqcdu
    Content-Type: text/vnd.wap.wml; charset=utf-8
    Content-Disposition: attachment; filename="20240629.wml" Content-Transfer-Encoding: quoted-printable

    #use wml::debian::translation-check translation="e3699f036461e1416232bc8af1a6f9a475163598"
    <define-tag pagetitle>Atualização Debian 12: 12.6 lançado</define-tag> <define-tag release_date>2024-06-29</define-tag>
    #use wml::debian::news

    <define-tag release>12</define-tag>
    <define-tag codename>bookworm</define-tag>
    <define-tag revision>12.6</define-tag>

    <define-tag dsa>
    <tr><td align="center"><a href="$(HOME)/security/%0/dsa-%1">DSA-%1</a></td>
    <td align="center"><:
    my @p = ();
    for my $p (split (/,\s*/, "%2")) {
    push (@p, sprintf ('<a href="https://packages.debian.org/src:%s">%s</a>', $p, $p));
    }
    print join (", ", @p);
    </td></tr>
    </define-tag>

    <define-tag correction>
    <tr><td><a href="https://packages.debian.org/src:%0">%0</a></td> <td>%1</td></tr>
    </define-tag>

    <define-tag srcpkg><a href="https://packages.debian.org/src:%0">%0</a></define-tag>

    <p>O projeto Debian está feliz em anunciar a sexta atualização de sua versão estável (stable) do Debian <release> (codinome <q><codename></q>). Esta versão pontual adiciona principalmente correções para problemas de segurança, além de pequenos ajustes para problemas mais sérios. Avisos de segurança já foram publicados em separado e são referenciados quando necessário.</p>

    <p>Por favor, note que a versão pontual não constitui uma nova versão do Debian
    <release>, mas apenas atualiza alguns dos pacotes já incluídos. Não há necessidade de jogar fora as antigas mídias do <q><codename></q>. Após a instalação, os pacotes podem ser atualizados para as versões atuais usando um
    espelho atualizado do Debian.</p>

    <p>Aquelas pessoas que frequentemente instalam atualizações a partir de security.debian.org não terão que atualizar muitos pacotes, e a maioria de tais
    atualizações estão incluídas na versão pontual.</p>

    <p>Novas imagens de instalação logo estarão disponíveis nos locais habituais.</p>

    <p>A atualização de uma instalação existente para esta revisão pode ser feita
    apontando o sistema de gerenciamento de pacotes para um dos muitos espelhos HTTP do Debian. Uma lista abrangente de espelhos está disponível em:</p>


    <div class="center">
    <a href="$(HOME)/mirror/list">https://www.debian.org/mirror/list</a>
    </div>




    <h2>Correções gerais de bugs</h2>

    <p>Esta atualização da versão estável (stable) adiciona algumas correções importantes para os seguintes pacotes:</p>

    <table border=0>
    <tr><th>Pacote</th> <th>Justificativa</th></tr>
    <correction aide "Fix concurrent reading of extended attributes">
    <correction amavisd-new "Handle multiple boundary parameters that contain conflicting values [CVE-2024-28054]; fix race condition in postinst">
    <correction archlinux-keyring "Switch to pre-built keyrings; sync with upstream">
    <correction base-files "Update for the 12.6 point release">
    <correction bash "Rebuild to fix outdated Built-Using">
    <correction bioawk "Disable parallel builds to fix random failures"> <correction bluez "Fix remote code execution issues [CVE-2023-27349 CVE-2023-50229 CVE-2023-50230]">
    <correction cdo "Disable hirlam-extensions to avoid causing issues with ICON data files">
    <correction chkrootkit "Rebuild to fix outdated Built-Using">
    <correction cjson "Fix missing NULL checks [CVE-2023-50471 CVE-2023-50472]"> <correction clamav "New upstream stable release; fix possible heap overflow issue [CVE-2024-20290], possible command injection issue [CVE-2024-20328]">
    <correction cloud-init "Declare conflicts/replaces on versioned package introduced for bullseye">
    <correction comitup "Ensure service is unmasked in post install">
    <correction cpu "Provide exactly one definition of globalLdap in LDAP plugin"> <correction crmsh "Create log directory and file on installation">
    <correction crowdsec-custom-bouncer "Rebuild to fix outdated Built-Using"> <correction crowdsec-firewall-bouncer "Rebuild against golang-github-google-nftables version with fixed little-endian architecture support">
    <correction curl "Do not keep default protocols when deselected [CVE-2024-2004]; fix memory leak [CVE-2024-2398]">
    <correction dar "Rebuild to fix outdated Built-Using">
    <correction dcmtk "Clean up properly on purge">
    <correction debian-installer "Increase Linux kernel ABI to 6.1.0-22; rebuild against proposed-updates">
    <correction debian-installer-netboot-images "Rebuild against proposed-updates"> <correction debvm "debvm-create: do install login; bin/debvm-waitssh: make --timeout=N work; bin/debvm-run: allow being run in environments without TERM set; fix resolv.conf in stretch">
    <correction dhcpcd5 "privsep: Allow zero length messages through; fix server not being restarted correctly during upgrades">
    <correction distro-info-data "Declare intentions for bullseye/bookworm; fix past data; add Ubuntu 24.10">
    <correction djangorestframework "Reinstate missing static files">
    <correction dm-writeboost "Fix build error with 6.9 kernel and backports"> <correction dns-root-data "Update root hints; update expired security information">
    <correction dpdk "New upstream stable release">
    <correction ebook-speaker "Support username over 8 characters when enumerating groups">
    <correction emacs "Security fixes [CVE-2024-30202 CVE-2024-30203 CVE-2024-30204 CVE-2024-30205]; replace expired package-keyring.gpg with a current version">
    <correction extrepo-data "Update repository information">
    <correction flatpak "New upstream stable release">
    <correction fpga-icestorm "Restore compatibility with yosys">
    <correction freetype "Disable COLRv1 support, which was unintentionally enabled by upstream; fix function existence check when calling get_colr_glyph_paint()">
    <correction galera-4 "New upstream bugfix release; update upstream release signing key; prevent date-related test failures">
    <correction gdk-pixbuf "ANI: Reject files with multiple anih chunks [CVE-2022-48622]; ANI: Reject files with multiple INAM or IART chunks; ANI: Validate anih chunk size">
    <correction glewlwyd "Fix potential buffer overflow during FIDO2 credential validation [CVE-2023-49208]; fix open redirection via redirect_uri [CVE-2024-25715]">
    <correction glib2.0 "Fix a (rare) memory leak">
    <correction glibc "Revert fix to always call destructors in reverse constructor order due to unforeseen application compatibility issues; fix a DTV corruption due to a reuse of a TLS module ID following dlclose with unused TLS">
    <correction gnutls28 "Fix certtool crash when verifying a certificate chain with more than 16 certificates [CVE-2024-28835]; fix side-channel in the deterministic ECDSA [CVE-2024-28834]; fix a memory leak; fix two segfault issues">
    <correction golang-github-containers-storage "Rebuild for outdated Built-Using">
    <correction golang-github-google-nftables "Fix AddSet() function on little-endian architectures">
    <correction golang-github-openshift-imagebuilder "Rebuild for outdated Built-Using">
    <correction gosu "Rebuild for outdated Built-Using">
    <correction gpaste "Fix conflict with older libpgpaste6">
    <correction gross "Fix stack-based buffer overflow [CVE-2023-52159]"> <correction hovercraft "Depend on python3-setuptools">
    <correction icinga2 "Fix segmentation fault on ppc64el">
    <correction igtf-policy-bundle "Address CAB Forum S/MIME policy change; apply accumulated updates to trust anchors">
    <correction intel-microcode "Security mitigations [CVE-2023-22655 CVE-2023-28746 CVE-2023-38575 CVE-2023-39368 CVE-2023-43490]; mitigate for INTEL-SA-01051 [CVE-2023-45733], INTEL-SA-01052 [CVE-2023-46103], INTEL-SA-01036 [CVE-2023-45745, CVE-2023-47855]
    and unspecified functional issues on various Intel processors">
    <correction jose "Fix potential denial-of-service issue [CVE-2023-50967]"> <correction json-smart "Fix excessive recursion leading to stack overflow [CVE-2023-1370]; fix denial of service via crafted request [CVE-2021-31684]">
    <correction kio "Fix file loss and potential locking issues on CIFS"> <correction lacme "Fix post-issuance validation logic">
    <correction libapache2-mod-auth-openidc "Fix mising input validation leading to DoS [CVE-2024-24814]">
    <correction libesmtp "Break and replace older library versions">
    <correction libimage-imlib2-perl "Fix package build">
    <correction libjwt "Fix timing side channel attack [CVE-2024-25189]"> <correction libkf5ksieve "Prevent leaking passwords into server-side logs"> <correction libmail-dkim-perl "Add dependency on libgetopt-long-descriptive-perl">
    <correction libpod "Handle removed containers properly">
    <correction libreoffice "Fix backup copy creation for files on mounted samba shares; don't remove libforuilo.so in -core-nogui">
    <correction libseccomp "Add support for syscalls up to Linux 6.7">
    <correction libtommath "Fix integer overflow [CVE-2023-36328]">
    <correction libtool "Conflict with libltdl3-dev; fix check for += operator in func_append">
    <correction libxml-stream-perl "Fix compatibility with IO::Socket::SSL &gt;= 2.078">
    <correction linux "New upstream stable release; increase ABI to 22"> <correction linux-signed-amd64 "New upstream stable release; increase ABI to 22">
    <correction linux-signed-arm64 "New upstream stable release; increase ABI to 22">
    <correction linux-signed-i386 "New upstream stable release; increase ABI to 22">
    <correction lua5.4 "debian/version-script: Export additional missing symbols for lua 5.4.4">
    <correction lxc-templates "Fix the <q>mirror</q> option of lxc-debian"> <correction mailman3 "Depend alternatively on cron-daemon; fix postgresql:// url in post-installation script">
    <correction mksh "Handle merged /usr in /etc/shells; fix crash with nested bashism; fix arguments to the dot command; distinguish unset and empty in `typeset -p`">
    <correction mobian-keyring "Update Mobian archive key">
    <correction ms-gsl "Mark not_null constructors as noexcept">
    <correction nano "Fix format string issues; fix <q>with --cutfromcursor, undoing a justification can eat a line</q>; fix malicious symlink issue; fix example bindings in nanorc">
    <correction netcfg "Handle routing for single-address netmasks">
    <correction ngircd "Respect <q>SSLConnect</q> option for incoming connections; server certificate validation on server links (S2S-TLS); METADATA: Fix unsetting <q>cloakhost</q>">
    <correction node-babel7 "Fix building against nodejs 18.19.0+dfsg-6~deb12u1; add Breaks/Replaces against obsolete node-babel-* packages">
    <correction node-undici "Properly export typescript types">
    <correction node-v8-compile-cache "Fix tests when a newer nodejs version is used">
    <correction node-zx "Fix flaky test">
    <correction nodejs "Skip flaky tests for mipsel/mips64el">
    <correction nsis "Don't allow unprivileged users to delete the uninstaller directory [CVE-2023-37378]; fix regression in disabling stub relocations; build reproducibly for arm64">
    <correction nvidia-graphics-drivers "Restore compatibility with newer Linux kernel builds; take over packages from nvidia-graphics-drivers-tesla; add new nvidia-suspend-common package; relax dh-dkms build-dependency for compatibility with bookworm; new
    upstream stable release [CVE-2023-0180 CVE-2023-0183 CVE-2023-0184 CVE-2023-0185 CVE-2023-0187 CVE-2023-0188 CVE-2023-0189 CVE-2023-0190 CVE-2023-0191 CVE-2023-0194 CVE-2023-0195 CVE-2023-0198 CVE-2023-0199 CVE-2023-25515 CVE-2023-25516 CVE-2023-31022
    CVE-2024-0074 CVE-2024-0075 CVE-2024-0078 CVE-2024-0090 CVE-2024-0092]"> <correction nvidia-graphics-drivers-tesla "Restore compatibility with newer Linux kernel builds">
    <correction nvidia-graphics-drivers-tesla-470 "Restore compatibility with newer Linux kernel builds; stop building nvidia-cuda-mps; new upstream stable release; security fixes [CVE-2022-42265 CVE-2024-0074 CVE-2024-0078 CVE-2024-0090 CVE-2024-0092]">
    <correction nvidia-modprobe "Prepare to switch to 535 series LTS drivers"> <correction nvidia-open-gpu-kernel-modules "Update to 535 series LTS drivers [CVE-2023-0180 CVE-2023-0183 CVE-2023-0184 CVE-2023-0185 CVE-2023-0187 CVE-2023-0188 CVE-2023-0189 CVE-2023-0190 CVE-2023-0191 CVE-2023-0194 CVE-2023-0195 CVE-2023-0198 CVE-2023-
    0199 CVE-2023-25515 CVE-2023-25516 CVE-2023-31022 CVE-2024-0074 CVE-2024-0075 CVE-2024-0078 CVE-2024-0090 CVE-2024-0092]">
    <correction nvidia-persistenced "Switch to 535 series LTS drivers; update list of supported drivers">
    <correction nvidia-settings "Also build for ppc64el; new upstream LTS release"> <correction nvidia-xconfig "New upstream LTS release">
    <correction openrc "Ignore non-executable scripts in /etc/init.d">
    <correction openssl "New upstream stable release; fix excessive time taken issues [CVE-2023-5678 CVE-2023-6237], vector register corruption issue on PowerPC [CVE-2023-6129], PKCS12 Decoding crashes [CVE-2024-0727]">
    <correction openvpn-dco-dkms "Build for Linux &gt;= 6.5; install compat-include directory; fix refcount imbalance">
    <correction orthanc-dicomweb "Rebuild to fix outdated Built-Using">
    <correction orthanc-gdcm "Rebuild to fix outdated Built-Using">
    <correction orthanc-mysql "Rebuild to fix outdated Built-Using">
    <correction orthanc-neuro "Rebuild to fix outdated Built-Using">
    <correction orthanc-postgresql "Rebuild to fix outdated Built-Using"> <correction orthanc-python "Rebuild to fix outdated Built-Using">
    <correction orthanc-webviewer "Rebuild to fix outdated Built-Using"> <correction orthanc-wsi "Rebuild to fix outdated Built-Using">
    <correction ovn "New upstream stable version; fix insufficient validation of incoming BFD packets [CVE-2024-2182]">
    <correction pdudaemon "Depend on python3-aiohttp">
    <correction php-composer-class-map-generator "Force system dependency loading"> <correction php-composer-pcre "Add missing Breaks+Replaces: on composer (&lt;&lt; 2.2)">
    <correction php-composer-xdebug-handler "Force system dependency loading"> <correction php-doctrine-annotations "Force system dependency loading"> <correction php-doctrine-deprecations "Force system dependency loading"> <correction php-doctrine-lexer "Force system dependency loading">
    <correction php-phpseclib "Guard isPrime() and randomPrime() for BigInteger [CVE-2024-27354]; limit OID length in ASN1 [CVE-2024-27355]; fix BigInteger getLength(); remove visibitility modifiers from static variables">
    <correction php-phpseclib3 "Force system dependency loading; guard isPrime() and randomPrime() for BigInteger [CVE-2024-27354]; limit OID length in ASN1 [CVE-2024-27355]; fix BigInteger getLength()">
    <correction php-proxy-manager "Force system dependency loading">
    <correction php-symfony-contracts "Force system dependency loading"> <correction php-zend-code "Force system dependency loading">
    <correction phpldapadmin "Fix compatbility with PHP 8.1+">
    <correction phpseclib "Force system dependency loading; guard isPrime() and randomPrime() for BigInteger [CVE-2024-27354]; limit OID length in ASN1 [CVE-2024-27355]; fix BigInteger getLength()">
    <correction postfix "New upstream stable release">
    <correction postgresql-15 "New upstream stable release; restrict visibility of pg_stats_ext and pg_stats_ext_exprs entries to the table owner [CVE-2024-4317]">
    <correction prometheus-node-exporter-collectors "Do not adversely affect mirror network; fix deadlock with other apt update runs">
    <correction pymongo "Fix out-of-bounds read issue [CVE-2024-5629]">
    <correction pypy3 "Strip C0 control and space characters in urlsplit [CVE-2023-24329]; avoid bypass of TLS handshake protections on closed sockets [CVE-2023-40217]; tempfile.TemporaryDirectory: fix symlink bug in cleanup [CVE-2023-6597]; protect zipfile
    from <q>quoted-overlap</q> zipbomb [CVE-2024-0450]">
    <correction python-aiosmtpd "Fix SMTP smuggling issue [CVE-2024-27305]; fix STARTTLS unencrypted command injection issue [CVE-2024-34083]">
    <correction python-asdf "Remove unnecessary dependency on asdf-unit-schemas"> <correction python-channels-redis "Ensure pools are closed on loop close in core">
    <correction python-idna "Fix denial of service issue [CVE-2024-3651]"> <correction python-jwcrypto "Fix denial of service issue [CVE-2024-28102]"> <correction python-xapian-haystack "Drop dependency on django.utils.six"> <correction python3.11 "Fix use-after-free crash when deallocating a frame object; protect zipfile from <q>quoted-overlap</q> zipbomb [CVE-2024-0450]; tempfile.TemporaryDirectory: fix symlink bug in cleanup [CVE-2023-6597]; fix <q>os.path.normpath():
    Path truncation at null bytes</q> [CVE-2023-41105]; avoid bypass of TLS handshake protections on closed sockets [CVE-2023-40217]; strip C0 control and space characters in urlsplit [CVE-2023-24329]; avoid a potential null pointer dereference in filleutils"

    <correction qemu "New upstream stable release; security fixes [CVE-2024-26327 CVE-2024-26328 CVE-2024-3446 CVE-2024-3447]">
    <correction qtbase-opensource-src "Fix regression in patch for CVE-2023-24607; avoid using system CA certificates when not wanted [CVE-2023-34410]; fix buffer overflow [CVE-2023-37369]; fix infinite loop in XML recursive entity expansion [CVE-2023-38197];
    fix buffer overflow with crafted KTX image file [CVE-2024-25580]; fix HPack integer overflow check [CVE-2023-51714]">
    <correction rails "Declare breaks and replaces on obsolete ruby-arel package"> <correction riseup-vpn "Use system certificate bundle by default, restoring ability to connect to an endpoint using LetsEncrypt certificate">
    <correction ruby-aws-partitions "Ensure binary package includes partitions.json and partitions-metadata.json files">
    <correction ruby-premailer-rails "Remove build-dependency on obsolete ruby-arel">
    <correction rust-cbindgen-web "New source package to support builds of newer Firefox ESR versions">
    <correction rustc-web "New source package to support builds of web browsers"> <correction schleuder "Fix argument parsing insufficient validation; fix importing keys from attachments sent by Thunderbird and handle mails without further content; look for keywords only at the start of mail; validate downcased email addresses when
    checking subscribers; consider From header for finding reply addresses"> <correction sendmail "Fix SMTP smuggling issue [CVE-2023-51765]">
    <correction skeema "Rebuild for outdated Built-Using">
    <correction skopeo "Rebuild for outdated Built-Using">
    <correction software-properties "software-properties-qt: Add Conflicts+Replaces: on software-properties-kde for smoother upgrades from bullseye">
    <correction supermin "Rebuild to fix outdated Built-Using">
    <correction symfony "Force system dependency loading; DateTypTest: ensure submitted year is accepted choice">
    <correction systemd "New upstream stable release; fix denial of service issues [CVE-2023-50387 CVE-2023-50868]; libnss-myhostname.nss: Install after <q>files</q>; libnss-mymachines.nss: Install before <q>resolve</q> and <q>dns</q>">
    <correction termshark "Rebuild to fix outdated Built-Using">
    <correction tripwire "Rebuild to fix outdated Built-Using">
    <correction tryton-client "Only send compressed content in authenticated sessions">
    <correction tryton-server "Prevent <q>zip-bomb</q> attacks from unauthenticated sources">
    <correction u-boot "Fix orion-timer for booting sheevaplug and related platforms">
    <correction uif "Support VLAN interface names">
    <correction umoci "Rebuild for outdated Built-Using">
    <correction user-mode-linux "Rebuilt to fix outdated Built-Using">
    <correction wayfire "Add missing dependencies">
    <correction what-is-python "Declare breaks and replaces on python-dev-is-python2; fix version mangling in build rules">
    <correction wpa "Fix authentication bypass issue [CVE-2023-52160]">
    <correction xscreensaver "Disable warning about old versions">
    <correction yapet "Do not call EVP_CIPHER_CTX_set_key_length() in crypt/blowfish and crypt/aes">
    <correction zsh "Rebuild to fix outdated Built-Using">
    </table>


    <h2>Atualizações de segurança</h2>


    <p>Esta revisão adiciona as seguintes atualizações de segurança para a versão
    estável (stable).
    A equipe de segurança já lançou um aviso para cada uma dessas atualizações:</p>

    <table border=0>
    <tr><th>ID do aviso</th> <th>Pacote</th></tr>
    <dsa 2023 5575 webkit2gtk>
    <dsa 2023 5580 webkit2gtk>
    <dsa 2023 5589 nodejs>
    <dsa 2024 5609 slurm-wlm-contrib>
    <dsa 2024 5616 ruby-sanitize>
    <dsa 2024 5618 webkit2gtk>
    <dsa 2024 5619 libgit2>
    <dsa 2024 5620 unbound>
    <dsa 2024 5621 bind9>
    <dsa 2024 5623 postgresql-15>
    <dsa 2024 5624 edk2>
    <dsa 2024 5625 engrampa>
    <dsa 2024 5626 pdns-recursor>
    <dsa 2024 5627 firefox-esr>
    <dsa 2024 5628 imagemagick>
    <dsa 2024 5630 thunderbird>
    <dsa 2024 5631 iwd>
    <dsa 2024 5632 composer>
    <dsa 2024 5633 knot-resolver>
    <dsa 2024 5635 yard>
    <dsa 2024 5637 squid>
    <dsa 2024 5638 libuv1>
    <dsa 2024 5640 openvswitch>
    <dsa 2024 5641 fontforge>
    <dsa 2024 5642 php-dompdf-svg-lib>
    <dsa 2024 5643 firefox-esr>
    <dsa 2024 5644 thunderbird>
    <dsa 2024 5645 firefox-esr>
    <dsa 2024 5646 cacti>
    <dsa 2024 5650 util-linux>
    <dsa 2024 5651 mediawiki>
    <dsa 2024 5653 gtkwave>
    <dsa 2024 5655 cockpit>
    <dsa 2024 5657 xorg-server>
    <dsa 2024 5658 linux-signed-amd64>
    <dsa 2024 5658 linux-signed-arm64>
    <dsa 2024 5658 linux-signed-i386>
    <dsa 2024 5658 linux>
    <dsa 2024 5659 trafficserver>
    <dsa 2024 5661 php8.2>
    <dsa 2024 5662 apache2>
    <dsa 2024 5663 firefox-esr>
    <dsa 2024 5664 jetty9>
    <dsa 2024 5665 tomcat10>
    <dsa 2024 5666 flatpak>
    <dsa 2024 5669 guix>
    <dsa 2024 5670 thunderbird>
    <dsa 2024 5672 openjdk-17>
    <dsa 2024 5673 glibc>
    <dsa 2024 5674 pdns-recursor>
    <dsa 2024 5677 ruby3.1>
    <dsa 2024 5678 glibc>
    <dsa 2024 5679 less>
    <dsa 2024 5680 linux-signed-amd64>
    <dsa 2024 5680 linux-signed-arm64>
    <dsa 2024 5680 linux-signed-i386>
    <dsa 2024 5680 linux>
    <dsa 2024 5682 glib2.0>
    <dsa 2024 5682 gnome-shell>
    <dsa 2024 5684 webkit2gtk>
    <dsa 2024 5685 wordpress>
    <dsa 2024 5686 dav1d>
    <dsa 2024 5688 atril>
    <dsa 2024 5690 libreoffice>
    <dsa 2024 5691 firefox-esr>
    <dsa 2024 5692 ghostscript>
    <dsa 2024 5693 thunderbird>
    <dsa 2024 5695 webkit2gtk>
    <dsa 2024 5698 ruby-rack>
    <dsa 2024 5699 redmine>
    <dsa 2024 5700 python-pymysql>
    <dsa 2024 5702 gst-plugins-base1.0>
    <dsa 2024 5704 pillow>
    <dsa 2024 5705 tinyproxy>
    <dsa 2024 5706 libarchive>
    <dsa 2024 5707 vlc>
    <dsa 2024 5708 cyrus-imapd>
    <dsa 2024 5709 firefox-esr>
    <dsa 2024 5711 thunderbird>
    <dsa 2024 5712 ffmpeg>
    <dsa 2024 5713 libndp>
    <dsa 2024 5714 roundcube>
    <dsa 2024 5715 composer>
    <dsa 2024 5717 php8.2>
    </table>


    <h2>Pacotes removidos</h2>

    <p>Os seguintes pacotes foram removidos por circunstâncias fora de nosso controle:</p>

    <table border=0>
    <tr><th>Pacote</th> <th>Justificativa</th></tr>
    <correction phppgadmin "Security issues; incompatible with bookworm's PostgreSQL version">
    <correction pytest-salt-factories "Only needed for salt, which is not part of bookworm">
    <correction ruby-arel "Obsolete, integrated into ruby-activerecord, incompatible with ruby-activerecord 6.1.x">
    <correction spip "Incompatible with bookworm's PHP version">
    <correction vasttrafik-cli "API withdrawn">

    </table>

    <h2>Instalador do Debian</h2>
    <p>O instalador foi atualizado para incluir as correções incorporadas
    na versão estável (stable) pela versão pontual.</p>

    <h2>URLs</h2>

    <p>As listas completas dos pacotes que foram alterados por esta revisão:</p>

    <div class="center">
    <url "https://deb.debian.org/debian/dists/<downcase <codename>>/ChangeLog"> </div>

    <p>A atual versão estável (stable):</p>

    <div class="center">
    <url "https://deb.debian.org/debian/dists/stable/">
    </div>

    <p>Atualizações propostas (proposed updates) para a versão estável (stable):</p>

    <div class="center">
    <url "https://deb.debian.org/debian/dists/proposed-updates">
    </div>

    <p>Informações da versão estável (stable) (notas de lançamento, errata, etc):</p>

    <div class="center">
    <a
    href="$(HOME)/releases/stable/">https://www.debian.org/releases/stable/</a> </div>

    <p>Anúncios de segurança e informações:</p>

    <div class="center">
    <a href="$(HOME)/security/">https://www.debian.org/security/</a>
    </div>

    <h2>Sobre o Debian</h2>

    <p>O projeto Debian é uma associação de desenvolvedores(as) de Software Livre
    que dedicam seu tempo e esforço como voluntários(as) para produzir o sistema operacional completamente livre Debian.</p>

    <h2>Informações de contato</h2>

    <p>Para mais informações, por favor visite as páginas web do Debian em
    <a href="$(HOME)/">https://www.debian.org/</a>, envie um e-mail (em inglês) para
    &lt;press@debian.org&gt;, ou entre em contato (em inglês) com a equipe de lançamento da versão estável (stable) em &lt;debian-release@lists.debian.org&gt;.</p>

    --loxrrn3ghattqcdu--

    -----BEGIN PGP SIGNATURE-----

    iQIzBAABCgAdFiEECgzx8d8+AINglLHJt4M9ggJ8mQsFAmaATAYACgkQt4M9ggJ8 mQuADg//WoOOeI8pXvsiQC6DdS0T3muy3gYj4oqUEFV+sYm1oVMv5JCLZpXVfr3G OvPD9libCKiu8oiNnJFTpKUnQ42OEC7ue0oP+Wv1Y67X1nqDNVVr1paY3/+0tG+k HLjXZ6CaXJnZXpsX9GhzfCPjoLjIHj80Y6a21JKrYEsUpbodSMVADYX8o5VHLGuE BXZfdc9wb7vuz5hlXW60On8FiCu3MuXkVhTeSKyU6ESAq1fgXLa7PZHbm+aBdNvU 00ABcvLQtuhqYYUk7X7+UHEkStA+kwy+mzFwkHSYUtMcNOZighXPTvp+Th0kO320 NcJ9L+lJec52YqSPuIwMdtFV6523jE4v/2QYz5HObt9d+muzn7yWtixAiSFx33RG 6ApnCzdu1+IeH/9WqtW0opne9KxTjfLInVaCdOwAmnvDGtaWXvUqzDblKUNIOmC5 2677JzoUqzO8Z4OxvBi9BLwyXbZgpA80xsY8MSjBzu+KmWu3hMoyLp5UE1NbBkdB EGgkJWf2xoEhYAp2UFzBxDqt0R4wBFEI+OCJyaTRSSFGFndNz9VbAcqzAKmaPBsR 1dhtTMX1tu73dMU5HAGS1hDh35+v4XOFfOOpr35k1GDPZMHS5aF1Cp673ygJeHnF tqM4BINFzRIX/r1oKBt1KGfPDLmgd9gH8gNnNaCHfDvxDVnBm2E=
    =I8VB
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Paulo Henrique de Lima Santana@21:1/5 to All on Sat Jul 13 15:40:01 2024
    This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------JcKNQqCOSs1KOy0WMjNvneNA
    Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64

    DQoNCkVtIDI5LzA2LzIwMjQgMTU6MDEsIENhcmxvcyBIZW5yaXF1ZSBMaW1hIE1lbGFyYSBl c2NyZXZldToNCj4gQm9hIHRhcmRlIQ0KPiANCj4gUGVzc29hbCwgaG9qZSBmb2kgbGFuw6dh ZGEgYXMgdmVyc8O1ZXMgcG9udHVhaXMgMTIuNiBlIDExLjEwLiBGaXogdW1hDQo+IHRyYWR1 w6fDo28gcsOhcGlkYSB1dGlsaXphbmRvIGEgw7psdGltYSB0cmFkdcOnw6NvIGZlaXRhIHBv ciBuw7NzLiBOw6NvIHRyYWR1emkNCj4gYXMgZGVzY3Jpw6fDtWVzIGRvcyBidWdzIHBvcnF1 ZSBuw6NvIHRlcmlhIHRlbXBvIGVzdGUgZmltIGRlIHNlbWFuYSAoc8Ojbw0KPiBzZW1wcmUg cGFsYXZyYXMgaW50cmljYWRhcyBlIGVzcGVjw61maWNhcyBkYSDDoXJlYSksIG1hcyBhY2hv IGltcG9ydGFudGUgYQ0KPiBnZW50ZSB0ZXIgYSBwYXJ0ZSBwcmluY2lwYWwgZGEgbm90w61j aWEgdHJhZHV6aWRhLiBDb252aWRvIG8ob3MvYXMpDQo+IHJldmlzb3IoZXMvYXMpIGEgc3Vn ZXJpciBhIHRyYWR1w6fDo28gY2FzbyB0ZW5oYW0gdGVtcG8uIFRhbWLDqW0gZ29zdGFyaWEN Cj4gZGUgdmVyaWZpY2FyIHNlIGNvbmNvcmRhbSBxdWUgZXUgc3ViYSBlc3NhIHByaW1laXJh IHRyYWR1w6fDo28gYW50ZXMgZGENCj4gcmV2aXPDo28gcG9yIHNlciBhbGdvIG1haXMgc2Vu c8OtdmVsIGFvIHRlbXBvIGRlIHB1YmxpY2HDp8Ojby4gUXVhbmRvIGNoZWdhcg0KPiBhIHJl dmlzw6NvLCBmYXJlaSBhIGF0dWFsaXphw6fDo28gZG8gYXJxdWl2by4NCg0KDQpPYnJpZ2Fk byBERCA6LSkNCg0KRml6IGEgcmV2aXPDo28gZSBlc3TDoSB0dWRvIG9rLg0KDQpWb2PDqiBw cmV0ZW5kZSB0cmFkdXppciBhcyBkZXNjcmnDp8O1ZXM/DQpJZGVhbG1lbnRlIMOpIGxlZ2Fs IHRyYWR1emlyLCBtYXMgcG9yIG91dHJvIGxhZG8sIHF1ZW0gdHJhYmFsaGEgY29tIA0KY29y cmXDp8O1ZXMgZGUgc2VndXJhbsOnYSBhY2FiYSBzZW5kbyBvYnJpZ2FkbyBhIGxlciBlbSBp bmdsw6pzIGRlIHF1YWxxdWVyIA0KZm9ybWEuDQoNClZpIHF1ZSBhbGd1bnMgdGltZXMgdHJh ZHV6ZW0gKGZyYW7Dp8OqcyBlIG8gaG9sYW5kw6pzKSBlIG91dHJvcyBuw6NvIA0KKGl0YWxp YW5vIGUgc3VlY28pLg0KDQpNaW5oYSBvcGluacOjbyDDqSBxdWUgbsOjbyBwcmVjaXNhbW9z IHRyYWR1emlyLg0KDQpBYnJhw6dvcywNCg0KLS0gDQpQYXVsbyBIZW5yaXF1ZSBkZSBMaW1h IFNhbnRhbmEgKHBobHMpDQpCZWxvIEhvcml6b250ZSAtIEJyYXNpbA0KRGViaWFuIERldmVs b3Blcg0KU2l0ZTogaHR0cDovL3BobHMuY29tLmJyDQpHUEcgSUQ6IDA0NDNDNDUwDQo=

    --------------JcKNQqCOSs1KOy0WMjNvneNA--

    -----BEGIN PGP SIGNATURE-----

    wsF5BAABCAAjFiEEQySpKy57hdp/nJxAxm0GtARDxFAFAmaSgyIFAwAAAAAACgkQxm0GtARDxFDa BxAAgesCCYDSOwUQ2YQN0lFeqqPWkLKDGDtKzfsbHHsJs46t6FrZVwRTggduaEtMtfSrZAi6ItF5 OFrO4pi0pTnJsLjou4i42lHY57cZdPCWpIDO3Jck3e+zjqvlYdqmAuKuqyf8w1OkyggK6nJsp8xk TefJ5u45QZkkIyUHx+BDxVPt8I3lNVqPqC701GpuQdcoLdzvRKV14OQ9xGdNzOUWpxkXMbPORJ6k 3uwSyF8YLOWW0rb9KV/XalwYruoVKmAB8Eh6DINdWx93dEtBD2zZA3IZEL2e3KToGQZytizoAjtc XOoqMa1XXMy8aV3PxlmS2evP/IqC9tdvHzcrCB8CDYuTq9zXHZsJJQ/Nl5wNkJZ0NUK2go4gdDQB ag8PB3Zk0LNhOVNB2C0beNRq8XAaTpFTKCFlYHHXuchBZySkDK5VUBKevTX37gkQEf55JpEXtcfZ Mbn+H6AUw/xkvZgO0sj0miJNZY+KCiTCwcsAND1ye61ICYWi1yhtoLMoBXRwPdG6fduJOe1tPYPp w2brWkfhQihh2fSjlX+rnQ0APq4nbhhpXb+wNdtUjabf3DlGLgyn1PAr7wHdeinPVqaA/EZKO1qj fmw4QEtmRXMEmnVSsQETBry48+JMncMvP7F7zuNeE9hJf/GbErkiGaLz5aUTIDGHXvOqz63QPvgP 98I=
    =bkKS
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)