Boa noite,

Amanhã será lançado o Debian 12.8 e aqui vai a tradução inicial que fiz
baseada no anúncio anterior para revisão.

Abraços,
Charles
<define-tag pagetitle>Atualização Debian 12: 12.8 lançado</define-tag>
<define-tag release_date>2024-11-09</define-tag>
#use wml::debian::news
# $Id:

<define-tag release>12</define-tag>
<define-tag codename>bookworm</define-tag>
<define-tag revision>12.8</define-tag>

<define-tag dsa>
    <tr><td align="center"><a href="$(HOME)/security/%0/dsa-%1">DSA-%1</a></td>
        <td align="center"><:
    my @p = ();
    for my $p (split (/,\s*/, "%2")) {
	push (@p, sprintf ('<a href="https://packages.debian.org/src:%s";>%s</a>', $p, $p));
    }
    print join (", ", @p);
:></td></tr>
</define-tag>

<define-tag correction>
    <tr><td><a href="https://packages.debian.org/src:%0";>%0</a></td>              <td>%1</td></tr>
</define-tag>

<define-tag srcpkg><a href="https://packages.debian.org/src:%0";>%0</a></define-tag>

<p>O projeto Debian está feliz em anunciar a oitava atualização de sua
versão estável (stable) do Debian <release> (codinome <q><codename></q>).
Esta versão pontual adiciona principalmente correções para problemas de
segurança, além de pequenos ajustes para problemas mais sérios. Avisos de
segurança já foram publicados em separado e são referenciados quando
necessário.</p>

<p>Por favor, note que a versão pontual não constitui uma nova versão do Debian
<release>, mas apenas atualiza alguns dos pacotes já incluídos. Não há
necessidade de jogar fora as antigas mídias do <q><codename></q>. Após a
instalação, os pacotes podem ser atualizados para as versões atuais usando um
espelho atualizado do Debian.</p>

<p>Aquelas pessoas que frequentemente instalam atualizações a partir de
security.debian.org não terão que atualizar muitos pacotes, e a maioria de tais
atualizações estão incluídas na versão pontual.</p>

<p>Novas imagens de instalação logo estarão disponíveis nos locais
habituais.</p>

<p>A atualização de uma instalação existente para esta revisão pode ser feita
apontando o sistema de gerenciamento de pacotes para um dos muitos espelhos
HTTP do Debian. Uma lista abrangente de espelhos está disponível em:</p>

<div class="center">
  <a href="$(HOME)/mirror/list">https://www.debian.org/mirror/list</a>
</div>


<h2>Correções gerais de bugs</h2>

<p>Esta atualização da versão estável (stable) adiciona algumas correções
importantes para os seguintes pacotes:</p>

<table border=0>
<tr><th>Pacote</th>               <th>Justificativa</th></tr>
<correction 7zip "Fix heap buffer overflow in NTFS handler [CVE-2023-52168]; fix out-of-bounds read in NTFS handler [CVE-2023-52169]">
<correction amanda "Update incomplete fix for CVE-2022-37704, restoring operation with xfsdump">
<correction apr "Use 0600 perms for named shared mem consistently [CVE-2023-49582]">
<correction base-files "Update for the point release">
<correction btrfs-progs "Fix checksum calculation errors during volume conversion in btrfs-convert">
<correction calamares-settings-debian "Fix missing launcher on KDE desktops; fix btrfs mounts">
<correction cjson "Fix segmentation violation issue [CVE-2024-31755]">
<correction clamav "New upstream stable release; fix denial of service issue [CVE-2024-20505], file corruption issue [CVE-2024-20506]">
<correction cloud-init "Add support for multiple networkd Route sections">
<correction cloud-initramfs-tools "Add missing dependencies in the initramfs">
<correction curl "Fix incorrect handling of some OCSP responses [CVE-2024-8096]">
<correction debian-installer "Reinstate some armel netboot targets (openrd); increase Linux kernel ABI to 6.1.0-27; rebuild against proposed-updates">
<correction debian-installer-netboot-images "Rebuild against proposed-updates">
<correction devscripts "bts: always upgrade to STARTTLS on 587/tcp; build-rdeps: add support for non-free-firmware; chdist: update sources.list examples with non-free-firmware; build-rdeps: use all available distros by default">
<correction diffoscope "Fix build failure when processing a deliberately overlapping zip file in tests">
<correction distro-info-data "Add Ubuntu 25.04">
<correction docker.io "Fix bypassing of AuthZ plugins in some circumstances [CVE-2024-41110]">
<correction dpdk "New upstream stable release">
<correction exim4 "Fix crash in dbmnz when looking up keys with no content">
<correction fcgiwrap "Set proper ownership on repositories in git backend">
<correction galera-4 "New upstream stable release">
<correction glib2.0 "Provide libgio-2.0-dev from libglib2.0-dev, and libgio-2.0-dev-bin from libglib2.0-dev-bin">
<correction glibc "Change Croatian locale to use Euro as currency; revert upstream commit that modified the GLIBC_PRIVATE ABI, causing crashes with some static binaries on arm64; vfscanf(): fix matches longer than INT_MAX; ungetc(): fix uninitialized read when putting into unused streams, backup buffer leak on program exit; mremap(): fix support for the MREMAP_DONTUNMAP option; resolv: fix timeouts caused by short error responses or when single-request mode is enabled in resolv.conf">
<correction gtk+3.0 "Fix letting Orca announce initial focus">
<correction ikiwiki-hosting "Allow reading of all user repositories">
<correction intel-microcode "New upstream release; security fixes [CVE-2024-23984 CVE-2024-24968]">
<correction ipmitool "Fix a buffer overrun in <q>open</q> interface; fix <q>lan print fails on unsupported parameters</q>; fix reading of temperature sensors; fix using hex values when sending raw data">
<correction iputils "Fix incorrect handling of ICMP responses intended for other processes">
<correction kexec-tools "Mask kexec.service to prevent the init.d script handling kexec process on a systemd enabled system">
<correction lemonldap-ng "Fix cross-site scripting vulnerability on login page [CVE-2024-48933]">
<correction lgogdownloader "Fix parsing of Galaxy URLs">
<correction libskk "Prevent crash on invalid JSON escape">
<correction libvirt "Fix running i686 VMs with AppArmor on the host; prevent certain guests from becoming unbootable or disappearing during upgrade">
<correction linux "New upstream release; bump ABI to 27">
<correction linux-signed-amd64 "New upstream release; bump ABI to 27">
<correction linux-signed-arm64 "New upstream release; bump ABI to 27">
<correction linux-signed-i386 "New upstream release; bump ABI to 27">
<correction llvm-toolchain-15 "Architecture-specific rebuild on mips64el to sync version with other architectures">
<correction nghttp2 "Fix denial of service issue [CVE-2024-28182]">
<correction ninja-build "Support large inode numbers on 32-bit systems">
<correction node-dompurify "Fix prototype pollution issues [CVE-2024-45801 CVE-2024-48910]">
<correction node-es-module-lexer "Fix build failure">
<correction node-globby "Fix build failure">
<correction node-mdn-browser-compat-data "Fix build failure">
<correction node-rollup-plugin-node-polyfills "Fix build failure">
<correction node-tap "Fix build failure">
<correction node-xterm "Fix TypeScript declarations">
<correction node-y-protocols "Fix build failure">
<correction node-y-websocket "Fix build failure">
<correction node-ytdl-core "Fix build failure">
<correction notify-osd "Correct executable path in desktop launcher file">
<correction ntfs-3g "Fix use-after-free in <q>ntfs-uppercase-mbs</q>; re-classify fuse as Depends, not Pre-Depends">
<correction openssl "New upstream stable release; fix buffer overread issue [CVE-2024-5535], out of bounds memory access [CVE-2024-9143]">
<correction ostree "Prevent crashing libflatpak when using curl 8.10">
<correction puppetserver "Reinstate scheduled job to clean reports after 30 days, avoiding disk space exhaustion">
<correction puredata "Fix privilege escalation issue [CVE-2023-47480]">
<correction python-cryptography "Fix NULL dereference when loading PKCS7 certificates [CVE-2023-49083]; fix NULL dereference when PKCS#12 key and cert don't match [CVE-2024-26130]">
<correction python3.11 "Fix regression in zipfile.Path; prevent ReDoS vulnerability with crafted tar archives">
<correction reprepro "Prevent hangs when running unzstd">
<correction sqlite3 "Fix a buffer overread issue [CVE-2023-7104], a stack overflow issue and an integer overflow issue">
<correction sumo "Fix a race condition when building documentation">
<correction systemd "New upstream stable release">
<correction tgt "chap: Use proper entropy source [CVE-2024-45751]">
<correction timeshift "Add missing dependency on pkexec">
<correction util-linux "Allow lscpu to identify new Arm cores">
<correction vmdb2 "Set locale to UTF-8">
<correction wireshark "New upstream security release [CVE-2024-0208, CVE-2024-0209, CVE-2024-2955, CVE-2024-4853, CVE-2024-4854, CVE-2024-4855, CVE-2024-8250, CVE-2024-8645]">
<correction xfpt "Fix buffer overflow issue [CVE-2024-43700]">
</table>


<h2>Atualizações de segurança</h2>

<p>Esta revisão adiciona as seguintes atualizações de segurança para a versão
estável (stable).
A equipe de segurança já lançou um aviso para cada uma dessas atualizações:</p>

<table border=0>
<tr><th>ID do aviso</th>  <th>Pacote</th></tr>
<dsa 2024 5729 apache2>
<dsa 2024 5733 thunderbird>
<dsa 2024 5744 thunderbird>
<dsa 2024 5758 trafficserver>
<dsa 2024 5759 python3.11>
<dsa 2024 5760 ghostscript>
<dsa 2024 5761 chromium>
<dsa 2024 5762 webkit2gtk>
<dsa 2024 5763 pymatgen>
<dsa 2024 5764 openssl>
<dsa 2024 5765 firefox-esr>
<dsa 2024 5766 chromium>
<dsa 2024 5767 thunderbird>
<dsa 2024 5768 chromium>
<dsa 2024 5769 git>
<dsa 2024 5770 expat>
<dsa 2024 5771 php-twig>
<dsa 2024 5772 libreoffice>
<dsa 2024 5773 chromium>
<dsa 2024 5774 ruby-saml>
<dsa 2024 5775 chromium>
<dsa 2024 5776 tryton-server>
<dsa 2024 5777 booth>
<dsa 2024 5778 cups-filters>
<dsa 2024 5779 cups>
<dsa 2024 5780 php8.2>
<dsa 2024 5781 chromium>
<dsa 2024 5782 linux-signed-amd64>
<dsa 2024 5782 linux-signed-arm64>
<dsa 2024 5782 linux-signed-i386>
<dsa 2024 5782 linux>
<dsa 2024 5783 firefox-esr>
<dsa 2024 5784 oath-toolkit>
<dsa 2024 5785 mediawiki>
<dsa 2024 5786 libgsf>
<dsa 2024 5787 chromium>
<dsa 2024 5788 firefox-esr>
<dsa 2024 5789 thunderbird>
<dsa 2024 5790 node-dompurify>
<dsa 2024 5791 python-reportlab>
<dsa 2024 5792 webkit2gtk>
<dsa 2024 5793 chromium>
<dsa 2024 5794 openjdk-17>
<dsa 2024 5795 python-sql>
<dsa 2024 5796 libheif>
<dsa 2024 5797 twisted>
<dsa 2024 5798 activemq>
<dsa 2024 5799 chromium>
<dsa 2024 5800 xorg-server>
<dsa 2024 5802 chromium>
</table>


<h2>Instalador do Debian</h2>

<p>O instalador foi atualizado para incluir as correções incorporadas
na versão estável (stable) pela versão pontual.</p>


<h2>URLs</h2>

<p>As listas completas dos pacotes que foram alterados por esta revisão:</p>

<div class="center">
  <url "https://deb.debian.org/debian/dists/<downcase <codename>>/ChangeLog">
</div>

<p>A atual versão estável (stable):</p>

<div class="center">
  <url "https://deb.debian.org/debian/dists/stable/";>
</div>

<p>Atualizações propostas (proposed updates) para a versão estável (stable):</p>

<div class="center">
  <url "https://deb.debian.org/debian/dists/proposed-updates";>
</div>

<p>Informações da versão estável (stable) (notas de lançamento, errata, etc):</p>

<div class="center">
  <a
  href="$(HOME)/releases/stable/">https://www.debian.org/releases/stable/</a>
</div>

<p>Anúncios de segurança e informações:</p>

<div class="center">
  <a href="$(HOME)/security/">https://www.debian.org/security/</a>
</div>


<h2>Sobre o Debian</h2>

<p>O projeto Debian é uma associação de desenvolvedores(as) de Software Livre
que dedicam seu tempo e esforço como voluntários(as) para produzir o sistema
operacional completamente livre Debian.</p>


<h2>Informações de contato</h2>

<p>Para mais informações, por favor visite as páginas web do Debian em
<a href="$(HOME)/">https://www.debian.org/</a>, envie um e-mail (em inglês) para
&lt;pr...@debian.org&gt;, ou entre em contato (em inglês) com a equipe de
lançamento da versão estável (stable) em
&lt;debian-rele...@lists.debian.org&gt;.</p>

Attachment: signature.asc
Description: PGP signature

Responder a