Updated Debian 12: 12.1 released
July 22nd, 2023
The Debian project is pleased to announce the first update of its
stable distribution Debian 12 (codename bookworm
).
This point release mainly adds corrections for security issues,
along with a few adjustments for serious problems. Security advisories
have already been published separately and are referenced where available.
Please note that the point release does not constitute a new version of Debian
12 but only updates some of the packages included. There is
no need to throw away old bookworm
media. After installation,
packages can be upgraded to the current versions using an up-to-date Debian
mirror.
Those who frequently install updates from security.debian.org won't have to update many packages, and most such updates are included in the point release.
New installation images will be available soon at the regular locations.
Upgrading an existing installation to this revision can be achieved by pointing the package management system at one of Debian's many HTTP mirrors. A comprehensive list of mirrors is available at:
Miscellaneous Bugfixes
This stable update adds a few important corrections to the following packages:
Package | Reason |
---|---|
aide | Properly handle creating the system user; fix child directory processing on equal match |
autofs | Fix hang when using Kerberos-authenticated LDAP |
ayatana-indicator-datetime | Fix playing of custom alarm sounds |
base-files | Update for the 12.1 point release |
bepasty | Fix rendering of text uploads |
boost1.81 | Add missing dependency on libboost-json1.81.0 to libboost-json1.81-dev |
bup | Correctly restore POSIX ACLs |
context | Enable socket in ConTeXt mtxrun |
cpdb-libs | Fix a buffer overflow vulnerability [CVE-2023-34095] |
cpp-httplib | Fix CRLF injection issue [CVE-2023-26130] |
crowdsec | Fix default acquis.yaml to also include the journalctl datasource, limited to the ssh.service unit, making sure acquisition works even without the traditional auth.log file; make sure an invalid datasource doesn't make the engine error out |
cups | Security fixes: use-after-free [CVE-2023-34241]; heap buffer overflow [CVE-2023-32324] |
cvs | Configure full path to ssh |
dbus | New upstream stable release; fix denial of service issue [CVE-2023-34969]; stop trying to take DPKG_ROOT into account, restoring copying of systemd's /etc/machine-id in preference to creating an entirely new machine ID |
debian-installer | Increase Linux kernel ABI to 6.1.0-10; rebuild against proposed-updates |
debian-installer-netboot-images | Rebuild against proposed-updates |
desktop-base | Remove emerald alternatives on package uninstallation |
dh-python | Re-introduce Breaks+Replaces on python2 needed to help apt in some upgrade scenarios |
dkms | Add Breaks against obsolete, incompatible *-dkms packages |
dnf | Fix default DNF const PYTHON_INSTALL_DIR |
dpdk | New upstream stable release |
exim4 | Fix argument parsing for ${run } expansion; fix ${srs_encode ..} returning incorrect result every 1024 days |
fai | Fix IP address lifetime |
glibc | Fix a buffer overflow in gmon; fix a deadlock in getaddrinfo (__check_pf) with deferred cancellation; fix y2038 support in strftime on 32-bit architectures; fix corner case parsing of /etc/gshadow which can return bad pointers, causing segfaults in applications; fix a deadlock in system() when called concurrently from multiple threads; cdefs: limit definition of fortification macros to __FORTIFY_LEVEL > 0 to support old C90 compilers |
gnome-control-center | New upstream bugfix release |
gnome-maps | New upstream bugfix release |
gnome-shell | New upstream bugfix release |
gnome-software | New upstream release; memory leak fixes |
gosa | Silence PHP 8.2 deprecation warnings; fix missing template in default theme; fix table styling; fix use of debugLevel > 0 |
groonga | Fix documentation links |
guestfs-tools | Security update [CVE-2022-2211] |
indent | Restore the ROUND_UP macro and adjust the initial buffer size |
installation-guide | Enable Indonesian translation |
kanboard | Fix malicious injection of HTML tags into DOM [CVE-2023-32685]; fix parameter-based indirect object referencing leading to private file exposure [CVE-2023-33956]; fix missing access controls [CVE-2023-33968, CVE-2023-33970]; fix stored XSS in Task External Link functionality [CVE-2023-33969] |
kf5-messagelib | Search also for subkeys |
libmatekbd | Fix memory leaks |
libnginx-mod-http-modsecurity | Binary rebuild with pcre2 |
libreoffice | New upstream bugfix release |
libreswan | Fix potential denial-of-service issue [CVE-2023-30570] |
libxml2 | Fix NULL pointer dereference issue [CVE-2022-2309] |
linux | New upstream stable release; netfilter: nf_tables: do not ignore genmask when looking up chain by id [CVE-2023-31248], prevent OOB access in nft_byteorder_eval [CVE-2023-35001] |
linux-signed-amd64 | New upstream stable release; netfilter: nf_tables: do not ignore genmask when looking up chain by id [CVE-2023-31248], prevent OOB access in nft_byteorder_eval [CVE-2023-35001] |
linux-signed-arm64 | New upstream stable release; netfilter: nf_tables: do not ignore genmask when looking up chain by id [CVE-2023-31248], prevent OOB access in nft_byteorder_eval [CVE-2023-35001] |
linux-signed-i386 | New upstream stable release; netfilter: nf_tables: do not ignore genmask when looking up chain by id [CVE-2023-31248], prevent OOB access in nft_byteorder_eval [CVE-2023-35001] |
mailman3 | Drop redundant cron job; handle ordering of services when MariaDB is present |
marco | Show correct window title when owned by superuser |
mate-control-center | Fix several memory leaks |
mate-power-manager | Fix several memory leaks |
mate-session-manager | Fix several memory leaks; allow clutter backends other than x11 |
multipath-tools | Hide underlying paths from LVM; prevent initial service failure on new installations |
mutter | New upstream bugfix release |
network-manager-strongswan | Build editor component with GTK 4 support |
nfdump | Return success when starting; fix segfault in option parsing |
nftables | Fix regression in set listing format |
node-openpgp-seek-bzip | Correct installation of files in seek-bzip package |
node-tough-cookie | Fix prototype pollution issue [CVE-2023-26136] |
node-undici | Security fixes: protect HostHTTP header from CLRF injection [CVE-2023-23936]; potential ReDoS on Headers.set and Headers.append [CVE-2023-24807] |
node-webpack | Security fix (cross-realm objects) [CVE-2023-28154] |
nvidia-cuda-toolkit | Update bundled openjdk-8-jre |
nvidia-graphics-drivers | New upstream stable release; security fixes [CVE-2023-25515 CVE-2023-25516] |
nvidia-graphics-drivers-tesla | New upstream stable release; security fixes [CVE-2023-25515 CVE-2023-25516] |
nvidia-graphics-drivers-tesla-470 | New upstream stable release; security fixes [CVE-2023-25515 CVE-2023-25516] |
nvidia-modprobe | New upstream bugfix release |
nvidia-open-gpu-kernel-modules | New upstream stable release; security fixes [CVE-2023-25515 CVE-2023-25516] |
nvidia-support | Add Breaks against incompatible packages from bullseye |
onionshare | Fix installation of desktop furniture |
openvpn | Fix memory leak and dangling pointer (possible crash vector) |
pacemaker | Fix regression in the resource scheduler |
postfix | New upstream bugfix release; fix postfix set-permissions |
proftpd-dfsg | Do not enable inetd-style socket at installation |
qemu | New upstream stable release; fix USB devices not being available to XEN HVM domUs; 9pfs: prevent opening special files [CVE-2023-2861]; fix reentrancy issues in the LSI controller [CVE-2023-0330] |
request-tracker5 | Fix links to documentation |
rime-cantonese | Sort words and characters by frequency |
rime-luna-pinyin | Install missing pinyin schema data |
samba | New upstream stable release; ensure manpages are generated during build; enable ability to store kerberos tickets in kernel keyring; fix build issues on armel and mipsel; fix windows logon/trust issues with 2023-07 windows updates |
schleuder-cli | Security fix (value escaping) |
smarty4 | Fix arbitrary code execution issue [CVE-2023-28447] |
spip | Various security issues; security fix (authentication data filtering) |
sra-sdk | Fix installation of files in libngs-java |
sudo | Fix event log format |
systemd | New upstream bugfix release |
tang | Fix race condition when creating/rotating keys [CVE-2023-1672] |
texlive-bin | Disable socket in luatex by default [CVE-2023-32668]; make installable on i386 |
unixodbc | Add Breaks+Replaces against odbcinst1debian1 |
usb.ids | Update included data |
vm | Disable byte compilation |
vte2.91 | New upstream bugfix release |
xerial-sqlite-jdbc | Use a UUID for connection ID [CVE-2023-32697] |
yajl | Memory leak security fix; fix denial of service issue [CVE-2017-16516], integer overflow issue [CVE-2022-24795] |
Security Updates
This revision adds the following security updates to the stable release. The Security Team has already released an advisory for each of these updates:
Debian Installer
The installer has been updated to include the fixes incorporated into stable by the point release.
URLs
The complete lists of packages that have changed with this revision:
The current stable distribution:
Proposed updates to the stable distribution:
stable distribution information (release notes, errata etc.):
Security announcements and information:
About Debian
The Debian Project is an association of Free Software developers who volunteer their time and effort in order to produce the completely free operating system Debian.
Contact Information
For further information, please visit the Debian web pages at https://www.debian.org/, send mail to <press@debian.org>, or contact the stable release team at <debian-release@lists.debian.org>.