Updated Debian 11: 11.4 released
The Debian project is pleased to announce the fourth update of its stable distribution Debian 11 (codename bullseye). This point release mainly adds corrections for security issues, along with a few adjustments for serious problems. Security advisories have already been published separately and are referenced where available.
Please note that the point release does not constitute a new version of Debian 11 but only updates some of the packages included. There is no need to throw away old bullseye media. After installation, packages can be upgraded to the current versions using an up-to-date Debian mirror.
Those who frequently install updates from security.debian.org won't have to update many packages, and most such updates are included in the point release.
New installation images will be available soon at the regular locations.
Upgrading an existing installation to this revision can be achieved by pointing the package management system at one of Debian's many HTTP mirrors. A comprehensive list of mirrors is available at:
Miscellaneous Bugfixes
This stable update adds a few important corrections to the following packages:
Package Reason apache2 New upstream stable release; fix HTTP request smuggling issue [CVE-2022-26377], out-of-bounds read issues [CVE-2022-28330 CVE-2022-28614 CVE-2022-28615], denial of service issues [CVE-2022-29404 CVE-2022-30522], possible out-of-bounds read issue [CVE-2022-30556], possible IP-based authentication bypass issue [CVE-2022-31813] base-files Update /etc/debian_version for the 11.4 point release bash Fix 1-byte buffer overflow read, causing corrupted multibyte characters in command substitutions clamav New upstream stable release; security fixes [CVE-2022-20770 CVE-2022-20771 CVE-2022-20785 CVE-2022-20792 CVE-2022-20796] clementine Add missing dependency on libqt5sql5-sqlite composer Fix code injection issue [CVE-2022-24828]; update GitHub token pattern cyrus-imapd Ensure that all mailboxes have a uniqueid field, fixing upgrades to version 3.6 dbus-broker Fix buffer overflow issue [CVE-2022-31212] debian-edu-config Accept mail from the local network sent to root@; only create Kerberos host and service principals if they don't yet exist; ensure libsss-sudo is installed on Roaming Workstations; fix naming and visibility of print queues; support krb5i on Diskless Workstations; squid: prefer DNSv4 lookups over DNSv6 debian-installer Rebuild against proposed-updates; increase Linux kernel ABI to 16; reinstate some armel netboot targets (openrd) debian-installer-netboot-images Rebuild against proposed-updates; increase Linux kernel ABI to 16; reinstate some armel netboot targets (openrd) distro-info-data Add Ubuntu 22.10, Kinetic Kudu docker.io Order docker.service after containerd.service to fix shutdown of containers; explicitly pass the containerd socket path to dockerd to make sure it doesn't start containerd on its own dpkg dpkg-deb: Fix unexpected end of file conditions on .deb extract; libdpkg: Do not restrict source:* virtual fields to installed packages; Dpkg::Source::Package::V2: Always fix the permissions for upstream tarballs (regression from DSA-5147-1] freetype Fix buffer overflow issue [CVE-2022-27404]; fix crashes [CVE-2022-27405 CVE-2022-27406] fribidi Fix buffer overflow issues [CVE-2022-25308 CVE-2022-25309]; fix crash [CVE-2022-25310] ganeti New upstream release; fix several upgrade issues; fix live migration with QEMU 4 and security_model of user or pool geeqie Fix Ctrl click inside of a block selection gnutls28 Fix SSSE3 SHA384 miscalculation; fix null pointer deference issue [CVE-2021-4209] golang-github-russellhaering-goxmldsig Fix null pointer dereference caused by crafted XML signatures [CVE-2020-7711] grunt Fix path traversal issue [CVE-2022-0436] hdmi2usb-mode-switch udev: Add a suffix to /dev/video device nodes to disambiguate them; move udev rules to priority 70, to come after 60-persistent-v4l.rules hexchat Add missing dependency on python3-cffi-backend htmldoc Fix infinite loop [CVE-2022-24191], integer overflow issues [CVE-2022-27114] and heap buffer overflow issue [CVE-2022-28085] knot-resolver Fix possible assertion failure in NSEC3 edge-case [CVE-2021-40083] libapache2-mod-auth-openidc New upstream stable release; fix open redirect issue [CVE-2021-39191]; fix crash on reload / restart libintl-perl Really install gettext_xs.pm libsdl2 Avoid out-of-bounds read while loading malformed BMP file [CVE-2021-33657], and during YUV to RGB conversion libtgowt New upstream stable release, to support newer telegram-desktop linux New upstream stable release; increase ABI to 16 linux-signed-amd64 New upstream stable release; increase ABI to 16 linux-signed-arm64 New upstream stable release; increase ABI to 16 linux-signed-i386 New upstream stable release; increase ABI to 16 logrotate Skip locking if state file is world-readable [CVE-2022-1348]; make configuration parsing stricter in order to avoid parsing foreign files such as core dumps lxc Update default GPG key server, fixing creating of containers using the download template minidlna Validate HTTP requests to protect against DNS rebinding attacks [CVE-2022-26505] mutt Fix uudecode buffer overflow issue [CVE-2022-1328] nano Several bug fixes, including fixes for crashes needrestart Make cgroup detection for services and user sessions cgroup v2 aware network-manager New upstream stable release nginx Fix crash when libnginx-mod-http-lua is loaded and init_worker_by_lua* is used; mitigate application layer protocol content confusion attack in the Mail module [CVE-2021-3618] node-ejs Fix server-side template injection issue [CVE-2022-29078] node-eventsource Strip sensitive headers on redirect to different origin [CVE-2022-1650] node-got Don't allow redirection to Unix socket [CVE-2022-33987] node-mermaid Fix cross-site scripting issues [CVE-2021-23648 CVE-2021-43861] node-minimist Fix prototype pollution issue [CVE-2021-44906] node-moment Fix path traversal issue [CVE-2022-24785] node-node-forge Fix signature verification issues [CVE-2022-24771 CVE-2022-24772 CVE-2022-24773] node-raw-body Fix potential denial of service issue in node-express, by using node-iconv-lite rather than node-iconv node-sqlite3 Fix denial of service issue [CVE-2022-21227] node-url-parse Fix authentication bypass issues [CVE-2022-0686 CVE-2022-0691] nvidia-cuda-toolkit Use OpenJDK8 snapshots for amd64 and ppc64el; check usability of the java binary; nsight-compute: Move the 'sections' folder to a multiarch location; fix nvidia-openjdk-8-jre version ordering nvidia-graphics-drivers New upstream release; switch to upstream 470 tree; fix denial of service issues [CVE-2022-21813 CVE-2022-21814]; fix out-of-bounds write issue [CVE-2022-28181], out-of-bounds read issue [CVE-2022-28183], denial of service issues [CVE-2022-28184 CVE-2022-28191 CVE-2022-28192] nvidia-graphics-drivers-legacy-390xx New upstream release; fix out-of-bound write issues [CVE-2022-28181 CVE-2022-28185] nvidia-graphics-drivers-tesla-418 New upstream stable release nvidia-graphics-drivers-tesla-450 New upstream stable release; fix out-of-bounds write issues [CVE-2022-28181 CVE-2022-28185], denial of service issue [CVE-2022-28192] nvidia-graphics-drivers-tesla-460 New upstream stable release nvidia-graphics-drivers-tesla-470 New package, switching Tesla support to upstream 470 tree; fix out-of-bounds write issue [CVE-2022-28181], out-of-bounds read issue [CVE-2022-28183], denial of service issues [CVE-2022-28184 CVE-2022-28191 CVE-2022-28192] nvidia-persistenced New upstream release; switch to upstream 470 tree nvidia-settings New upstream release; switch to upstream 470 tree nvidia-settings-tesla-470 New package, switching Tesla support to upstream 470 tree nvidia-xconfig New upstream release openssh seccomp: add pselect6_time64 syscall on 32-bit architectures orca Fix usage with webkitgtk 2.36 php-guzzlehttp-psr7 Fix improper header parsing [CVE-2022-24775] phpmyadmin Fix some SQL queries generating a server error postfix New upstream stable release; do not override user set default_transport in postinst; if-up.d: do not error out if postfix can't send mail yet procmail Fix null pointer dereference python-scrapy Don't send authentication data with all requests [CVE-2021-41125]; don't expose cookies cross-domain when redirecting [CVE-2022-0577] ruby-net-ssh Fix authentication against systems using OpenSSH 8.8 runc Honour seccomp defaultErrnoRet; do not set inheritable capabilities [CVE-2022-29162] samba Fix winbind start failure when allow trusted domains = no is used; fix MIT Kerberos authentication; fix share escape issue via mkdir race condition [CVE-2021-43566]; fix possible serious data corruption issue due to Windows client cache poisoning; fix installation on non-systemd systems tcpdump Update AppArmor profile to allow access to *.cap files, and handle numerical suffix in filenames added by -W telegram-desktop New upstream stable release, restoring functionality tigervnc Fix GNOME desktop start up when using tigervncserver@.service; fix colour display when vncviewer and X11 server use different endianness twisted Fix information disclosure issue with cross-domain redirects [CVE-2022-21712], denial of service issue during SSH handshakes [CVE-2022-21716], HTTP request smuggling issues [CVE-2022-24801] tzdata Update timezone data for Palestine; update leap second list ublock-origin New upstream stable release unrar-nonfree Fix directory traversal issue [CVE-2022-30333] usb.ids New upstream release; update included data wireless-regdb New upstream release; remove diversion added by the installer, ensuring that files from the package are used Security Updates
This revision adds the following security updates to the stable release. The Security Team has already released an advisory for each of these updates:
Removed packages
The following packages were removed due to circumstances beyond our control:
Package Reason elog Unmaintained; security issues python-hbmqtt Unamintained and broken Debian Installer
The installer has been updated to include the fixes incorporated into stable by the point release.
URLs
The complete lists of packages that have changed with this revision:
The current stable distribution:
Proposed updates to the stable distribution:
stable distribution information (release notes, errata etc.):
Security announcements and information:
About Debian
The Debian Project is an association of Free Software developers who volunteer their time and effort in order to produce the completely free operating system Debian.
The fourth update of Debian GNU/Linux 11 is now available. This point release mainly adds corrections for security issues, along with a few important corrections for serious problems.