[Debian News] Updated Debian 12: 12.4 released

The Debian Project News and Announcements curated from official Debian news and rss feeds.

All information here is for reading only, please do not reply to threads in this forum.
Post Reply
Message
Author
Debian News
Forum Account
Forum Account
Posts: 365
Joined: 2023-11-01 21:33
Been thanked: 9 times

[Debian News] Updated Debian 12: 12.4 released

#1 Post by Debian News »

Updated Debian 12: 12.4 released


Source: https://micronews.debian.org/2023/1702271976.html

Updated Debian 12: 12.4 released
December 10th, 2023

Please be advised that this document has been updated as best to reflect Debian 12.3 being superseded by Debian 12.4. These changes came about from a last minute bug advisory of #1057843 concerning issues with kernel-image-6.1.0-14 (6.1.64-1).

Debian 12.4 is released with kernel-image-6.1.0-15 (6.1.66), along with a few other bug fixes

The Debian project is pleased to announce the forth update of its stable distribution Debian 12 (codename bookworm). This point release mainly adds corrections for security issues, along with a few adjustments for serious problems. Security advisories have already been published separately and are referenced where available.

Please note that the point release does not constitute a new version of Debian 12 but only updates some of the packages included. There is no need to throw away old bookworm media. After installation, packages can be upgraded to the current versions using an up-to-date Debian mirror.

Those who frequently install updates from security.debian.org won't have to update many packages, and most such updates are included in the point release.

New installation images will be available soon at the regular locations.

Upgrading an existing installation to this revision can be achieved by pointing the package management system at one of Debian's many HTTP mirrors. A comprehensive list of mirrors is available at:

https://www.debian.org/mirror/list
Miscellaneous Bugfixes
This stable update adds a few important corrections to the following packages:

Code: Select all

Package	Reason
adequate	Skip symbol-size-mismatch test on architectures where array symbols don't include a specific length; disable deprecation warnings about smartmatch, given, when in Perl 5.38; fix warnings from version comparison about smartmatch being experimental
amanda	Fix local privilege escalation [CVE-2023-30577]
arctica-greeter	Move logo away from border when greeting
awstats	Avoid prompts on upgrade due to logrotate configuration cleanup
axis	Filter out unsupported protocols in the client class ServiceFactory [CVE-2023-40743]
base-files	Update for the 12.4 point release
ca-certificates-java	Remove circular dependencies
calibre	Fix crash in Get Books when regenerating UIC files
crun	Fix containers with systemd as their init system, when using newer kernel versions
cups	Take into account that on some printers the ColorModel option's choice for color printing is CMYK and not RGB
dav4tbsync	New upstream version, restoring compatibility with newer Thunderbird versions
debian-edu-artwork	Provide an Emerald theme based artwork for Debian Edu 12
debian-edu-config	New upstream stable version; fix setting and changing of LDAP passwords
debian-edu-doc	Update included documentation and translations
debian-edu-fai	New upstream stable version
debian-edu-router	Fix dnsmasq conf generation for networks over VLAN; only generate UIF filter rules for SSH if 'Uplink' interface is defined; update translations
debian-installer	Increase Linux kernel ABI to 6.1.0-15; rebuild against proposed-updates
debian-installer-netboot-images	Rebuild against proposed-updates
debootstrap	Backport merged-/usr support changes from trixie: implement merged-/usr by post-merging, default to merged-/usr for suites newer than bookworm in all profiles
devscripts	Debchange: Update to current Debian distributions
dhcpcd5	Change Breaks/Replaces dhcpcd5 to Conflicts
di-netboot-assistant	Fix support for bookworm live ISO image
distro-info	Update tests for distro-info-data 0.58+deb12u1, which adjusted Debian 7's EoL date
distro-info-data	Add Ubuntu 24.04 LTS Noble Numbat; fix several End Of Life dates
eas4tbsync	New upstream version, restoring compatibility with newer Thunderbird versions
exfatprogs	Fix out-of-bounds memory access issues [CVE-2023-45897]
exim4	Fix security issues relating to the proxy protocol [CVE-2023-42117] and DNSDB lookups [CVE-2023-42119]; add hardening for SPF lookups; disallow UTF-16 surrogates from ${utf8clean:...}; fix crash with tls_dhparam = none; fix $recipients expansion when used within ${run...}; fix expiry date of auto-generated SSL certificates; fix crash induced by some combinations of zero-length strings and ${tr...}
fonts-noto-color-emoji	Add support for Unicode 15.1
gimp	Add Conflicts and Replaces: gimp-dds to remove old versions of this plugin shipped by gimp itself since 2.10.10
gnome-characters	Add support for Unicode 15.1
gnome-session	Open text files in gnome-text-editor if gedit is not installed
gnome-shell	New upstream stable release; allow notifications to be dismissed with backspace key in addition to the delete key; fix duplicate devices shown when reconnecting to PulseAudio; fix possible use-after-free crashes on PulseAudio/Pipewire restart; avoid sliders in quick settings (volume, etc.) being reported to accessibility tools as their own parent object; align scrolled viewports to the pixel grid to avoid jitter visible during scrolling
gnutls28	Fix timing sidechannel issue [CVE-2023-5981]
gosa	New upstream stable release
gosa-plugins-sudo	Fix uninitialised variable
hash-slinger	Fix generation of TLSA records
intel-graphics-compiler	Fix compatibility with stable's intel-vc-intrinsics version
iotop-c	Fix the logic in only option; fix busy loop when ESC is pressed; fix ASCII graph rendering
jdupes	Update prompts to help avoid choices that could lead to unexpected data loss
lastpass-cli	New upstream stable release; update certificate hashes; add support for reading encrypted URLs
libapache2-mod-python	Ensure binNMU versions are PEP-440-compliant
libde265	Fix segmentation violation issue [CVE-2023-27102], buffer overflow issues [CVE-2023-27103 CVE-2023-47471], buffer over-read issue [CVE-2023-43887]
libervia-backend	Fix start failure without pre-existing configuration; make exec path absolute in dbus service file; fix dependencies on python3-txdbus/python3-dbus
libmateweather	Locations: add San Miguel de Tucuman (Argentina); update forecast zones for Chicago; update data server URL; fix some location names
libsolv	Enable support for zstd compression
linux	Update to upstream stable release 6.1.64; update ABI to 14; [rt] Update to 6.1.59-rt16; enable X86_PLATFORM_DRIVERS_HP; nvmet: nul-terminate the NQNs passed in the connect command [CVE-2023-6121]
linux-signed-amd64	Update to upstream stable release 6.1.64; update ABI to 14; [rt] Update to 6.1.59-rt16; enable X86_PLATFORM_DRIVERS_HP; nvmet: nul-terminate the NQNs passed in the connect command [CVE-2023-6121]
linux-signed-arm64	Update to upstream stable release 6.1.64; update ABI to 14; [rt] Update to 6.1.59-rt16; enable X86_PLATFORM_DRIVERS_HP; nvmet: nul-terminate the NQNs passed in the connect command [CVE-2023-6121]
linux-signed-i386	Update to upstream stable release 6.1.64; update ABI to 14; [rt] Update to 6.1.59-rt16; enable X86_PLATFORM_DRIVERS_HP; nvmet: nul-terminate the NQNs passed in the connect command [CVE-2023-6121]
llvm-toolchain-16	New backported package to support builds of newer chromium versions
lxc	Fix creating of ephemeral copies
mda-lv2	Fix LV2 plugin installation location
midge	Remove non-free example files
minizip	Fix integer and heap overflow issues [CVE-2023-45853]
mrtg	Handle relocated configuration file; translation updates
mutter	New upstream stable release; fix the ability to drag libdecor windows by their title bar on touchscreens; fix flickering and rendering artifacts when using software rendering; improve GNOME Shell app grid performance by avoiding repainting monitors other than the one it is displayed on
nagios-plugins-contrib	Fix on-disk kernel version detection
network-manager-openconnect	Add User Agent to Openconnect VPN for NetworkManager
node-undici	Delete cookie and host headers on cross-origin redirect [CVE-2023-45143]
nvidia-graphics-drivers	New upstream release; fix null pointer dereference issue [CVE-2023-31022]
nvidia-graphics-drivers-tesla	New upstream release; fix null pointer dereference issue [CVE-2023-31022]
nvidia-graphics-drivers-tesla-470	New upstream release; fix null pointer dereference issue [CVE-2023-31022]
nvidia-open-gpu-kernel-modules	New upstream release; fix null pointer dereference issue [CVE-2023-31022]
opendkim	Fix removal of incoming Authentication-Results: headers [CVE-2022-48521]
openrefine	Fix remote code execution vulnerability [CVE-2023-41887 CVE-2023-41886]
opensc	Fix out-of-bounds read issue [CVE-2023-4535], potential PIN bypass [CVE-2023-40660], memory-handling issues [CVE-2023-40661]
oscrypto	Fix OpenSSL version parsing; fix autopkgtest
pcs	Fix resource move
perl	Fix buffer overrun issue [CVE-2023-47038]
php-phpseclib3	Fix denial of service issue [CVE-2023-49316]
postgresql-15	New upstream stable release; fix SQL injection issue [CVE-2023-39417]; fix MERGE to enforce row security policies properly [CVE-2023-39418]
proftpd-dfsg	Fix size of SSH key exchange buffers
python-cogent	Only skip tests that require multiple CPUs when running on a single CPU system
python3-onelogin-saml2	Fix expired test payloads
pyzoltan	Support building on single core systems
qbittorrent	Disable UPnP for web UI by default in qbittorrent-nox
qemu	Update to upstream stable release 7.2.7; hw/scsi/scsi-disk: Disallow block sizes smaller than 512 [CVE-2023-42467]
qpdf	Fix data loss issue with some quoted octal strings
redis	Drop ProcSubset=pid hardening flag from the systemd unit due to it causing crashes
rust-sd	Ensure binary package versions sorts correctly relative to older releases (where it was built from a different source package)
sitesummary	Use systemd timer for running sitesummary-client if available
speech-dispatcher-contrib	Enable voxin on armhf and arm64
spyder	Fix interface language auto-configuration
symfony	Fix session fixation issue [CVE-2023-46733]; add missing escaping [CVE-2023-46734]
systemd	New upstream stable release
tbsync	New upstream version, restoring compatibility with newer Thunderbird versions
toil	Only request a single core for tests
tzdata	Update leap second list
unadf	Fix buffer overflow issue [CVE-2016-1243]; fix code execution issue [CVE-2016-1244]
vips	Fix null pointer dereference issue [CVE-2023-40032]
weborf	Fix denial of service issue
wormhole-william	Disable flaky tests, fixing build failures
xen	New upstream stable update; fix several security issues [CVE-2022-40982 CVE-2023-20569 CVE-2023-20588 CVE-2023-20593 CVE-2023-34320 CVE-2023-34321 CVE-2023-34322 CVE-2023-34323 CVE-2023-34325 CVE-2023-34326 CVE-2023-34327 CVE-2023-34328 CVE-2023-46835 CVE-2023-46836]
yuzu	Strip :native from glslang-tools build dependency, fixing build failure
Security Updates
This revision adds the following security updates to the stable release. The Security Team has already released an advisory for each of these updates:

Advisory ID Package
DSA-5499 chromium
DSA-5506 firefox-esr
DSA-5508 chromium
DSA-5511 mosquitto
DSA-5512 exim4
DSA-5513 thunderbird
DSA-5514 glibc
DSA-5515 chromium
DSA-5516 libxpm
DSA-5517 libx11
DSA-5518 libvpx
DSA-5519 grub-efi-amd64-signed
DSA-5519 grub-efi-arm64-signed
DSA-5519 grub-efi-ia32-signed
DSA-5519 grub2
DSA-5520 mediawiki
DSA-5521 tomcat10
DSA-5523 curl
DSA-5524 libcue
DSA-5525 samba
DSA-5526 chromium
DSA-5527 webkit2gtk
DSA-5528 node-babel7
DSA-5529 slurm-wlm-contrib
DSA-5529 slurm-wlm
DSA-5531 roundcube
DSA-5532 openssl
DSA-5533 gst-plugins-bad1.0
DSA-5534 xorg-server
DSA-5535 firefox-esr
DSA-5536 chromium
DSA-5538 thunderbird
DSA-5539 node-browserify-sign
DSA-5540 jetty9
DSA-5541 request-tracker5
DSA-5542 request-tracker4
DSA-5543 open-vm-tools
DSA-5544 zookeeper
DSA-5545 vlc
DSA-5546 chromium
DSA-5547 pmix
DSA-5548 jtreg6
DSA-5548 openjdk-17
DSA-5549 trafficserver
DSA-5550 cacti
DSA-5551 chromium
DSA-5552 ffmpeg
DSA-5553 postgresql-15
DSA-5555 openvpn
DSA-5556 chromium
DSA-5557 webkit2gtk
DSA-5558 netty
DSA-5559 wireshark
DSA-5560 strongswan
DSA-5561 firefox-esr
DSA-5562 tor
DSA-5563 intel-microcode
DSA-5564 gimp
DSA-5565 gst-plugins-bad1.0
DSA-5566 thunderbird
DSA-5567 tiff
DSA-5568 fastdds
DSA-5569 chromium
DSA-5570 nghttp2
DSA-5571 rabbitmq-server
Removed packages
The following packages were removed due to circumstances beyond our control:

Package Reason
gimp-dds No longer required; integrated into GIMP
Debian Installer
The installer has been updated to include the fixes incorporated into stable by the point release.

URLs
The complete lists of packages that have changed with this revision:

https://deb.debian.org/debian/dists/bookworm/ChangeLog
The current stable distribution:

https://deb.debian.org/debian/dists/stable/
Proposed updates to the stable distribution:

https://deb.debian.org/debian/dists/proposed-updates
stable distribution information (release notes, errata etc.):

https://www.debian.org/releases/stable/
Security announcements and information:

https://www.debian.org/security/
About Debian
The Debian Project is an association of Free Software developers who volunteer their time and effort in order to produce the completely free operating system Debian.

Contact Information
For further information, please visit the Debian web pages at https://www.debian.org/, send mail to <press@debian.org>, or contact the stable release team at <debian-release@lists.debian.org>.

User avatar
sunrat
Site admin
Site admin
Posts: 7502
Joined: 2006-08-29 09:12
Location: Melbourne, Australia
Has thanked: 135 times
Been thanked: 678 times

Re: [Debian News] Updated Debian 12: 12.4 released https://www.debian.org/News/2023/20231210

#2 Post by sunrat »

Yay! One of these years I may actually upgrade my Bullseye. :mrgreen:
“ computer users can be divided into 2 categories:
Those who have lost data
...and those who have not lost data YET ”
Remember to BACKUP!

DebianMan
Posts: 52
Joined: 2023-06-06 10:22
Has thanked: 28 times
Been thanked: 2 times

Re: [Debian News] Updated Debian 12: 12.4 released

#3 Post by DebianMan »

Hi,

I had done an upgrade to Debian 12.3 over the weekend and I only saw the post about not upgrading to 12.3 yesterday. I think the problem was related to some issue with the 12.3 update messing up the file system. I did another update today and now my system is 12.4. My question is does upgrading to 12.4 fix the problem for people who did the 12.3 update. In other words do I have anything to worry about?

Thanks.
Last edited by DebianMan on 2023-12-12 15:25, edited 1 time in total.

gusnan
Posts: 47
Joined: 2009-01-15 06:26
Has thanked: 3 times
Been thanked: 1 time

Re: [Debian News] Updated Debian 12: 12.4 released

#4 Post by gusnan »

DebianMan wrote: 2023-12-12 15:19 I had done an upgrade to Debian 12.3 over the weekend and I only saw the post about not upgrading to 12.3 yesterday. I think the problem was related to some issue with the 12.3 update messing up the file system. I did another update today and now my system is 12.4. My question is does upgrading to 12.4 fix the problem for people who did the 12.3 update. In other words do I have anything to worry about?
The file system problems were present in the kernel update included in the Debian 12.3 upgrade, and the fix of this is in the kernel upgrade in Debian 12.4. If your uname -a reports some like the following you should be safe:

Code: Select all

Linux debian-i7 6.1.0-15-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.66-1 (2023-12-09) x86_64 GNU/Linux

DebianMan
Posts: 52
Joined: 2023-06-06 10:22
Has thanked: 28 times
Been thanked: 2 times

Re: [Debian News] Updated Debian 12: 12.4 released

#5 Post by DebianMan »

The following is the output when I ran uname-a:

Code: Select all

Linux debian12 6.1.0-9-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.27-1 (2023-05-08) x86_64 GNU/Linux
I'm assuming I'm safe since the affected kernel was 6.1.64-1?
Last edited by DebianMan on 2023-12-12 17:39, edited 1 time in total.

User avatar
sunrat
Site admin
Site admin
Posts: 7502
Joined: 2006-08-29 09:12
Location: Melbourne, Australia
Has thanked: 135 times
Been thanked: 678 times

Re: [Debian News] Updated Debian 12: 12.4 released

#6 Post by sunrat »

DebianMan wrote: 2023-12-12 17:38 The following is the output when I ran uname-a:

Code: Select all

Linux debian12 6.1.0-9-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.27-1 (2023-05-08) x86_64 GNU/Linux
I'm assuming I'm safe since the affected kernel was 6.1.64-1?
That's an old kernel. Did you reboot after the upgrade to load the new kernel?
You can check your Debian version with:

Code: Select all

cat /etc/debian_version
“ computer users can be divided into 2 categories:
Those who have lost data
...and those who have not lost data YET ”
Remember to BACKUP!

DebianMan
Posts: 52
Joined: 2023-06-06 10:22
Has thanked: 28 times
Been thanked: 2 times

Re: [Debian News] Updated Debian 12: 12.4 released

#7 Post by DebianMan »

sunrat wrote: 2023-12-12 20:35 That's an old kernel. Did you reboot after the upgrade to load the new kernel?
You can check your Debian version with:

Code: Select all

cat /etc/debian_version
Hi sunrat,

I never turn my computer off. I was wondering why my kernel was from 05/2023. I used the cat command to check my version and it is 12.4. I am afraid of restarting now because I am seeing people having issues with the 12.4 kernel on the following thread:

viewtopic.php?t=157738

Maybe I should wait for 12.5 to be released before I do a restart?

User avatar
sunrat
Site admin
Site admin
Posts: 7502
Joined: 2006-08-29 09:12
Location: Melbourne, Australia
Has thanked: 135 times
Been thanked: 678 times

Re: [Debian News] Updated Debian 12: 12.4 released

#8 Post by sunrat »

You need to reboot to load a new kernel.
“ computer users can be divided into 2 categories:
Those who have lost data
...and those who have not lost data YET ”
Remember to BACKUP!

DebianMan
Posts: 52
Joined: 2023-06-06 10:22
Has thanked: 28 times
Been thanked: 2 times

Re: [Debian News] Updated Debian 12: 12.4 released

#9 Post by DebianMan »

sunrat wrote: 2023-12-12 20:59 You need to reboot to load a new kernel.
Thanks I didn't know that. Since I didn't restart since installing 12.3 I think that answers my question on whether or not my system was adversely affected. I'll wait a week or two before I do a restart just in case there are issues with the 12.4 update.

Post Reply