aboutsummaryrefslogtreecommitdiffstats
path: root/swedish
diff options
context:
space:
mode:
authorJean-Pierre Giraud <jean-pierregiraud@neuf.fr>2024-02-10 18:07:39 +0100
committerJean-Pierre Giraud <jean-pierregiraud@neuf.fr>2024-02-10 18:07:39 +0100
commit292997bd3298f0857943c19f38b68511f7442104 (patch)
tree5a8b78118d1397aecb5d65c714fadaaecfdfdae5 /swedish
parent9d41ab1625a3bbe9bf95b782d91e91b766a3f664 (diff)
announcement for 12.5 and 11.9 point releases, french, polish an swedish translation
Diffstat (limited to 'swedish')
-rw-r--r--swedish/News/2024/20240210.wml238
-rw-r--r--swedish/News/2024/2024021002.wml299
-rw-r--r--swedish/News/2024/Makefile1
-rw-r--r--swedish/News/2024/index.wml13
4 files changed, 551 insertions, 0 deletions
diff --git a/swedish/News/2024/20240210.wml b/swedish/News/2024/20240210.wml
new file mode 100644
index 00000000000..446c5e0e59a
--- /dev/null
+++ b/swedish/News/2024/20240210.wml
@@ -0,0 +1,238 @@
+#use wml::debian::translation-check translation="9d41ab1625a3bbe9bf95b782d91e91b766a3f664"
+<define-tag pagetitle>Uppdaterad Debian 12; 12.5 utgiven</define-tag>
+<define-tag release_date>2024-02-10</define-tag>
+#use wml::debian::news
+
+<define-tag release>12</define-tag>
+<define-tag codename>bookworm</define-tag>
+<define-tag revision>12.5</define-tag>
+
+<define-tag dsa>
+ <tr><td align="center"><a href="$(HOME)/security/%0/dsa-%1">DSA-%1</a></td>
+ <td align="center"><:
+ my @p = ();
+ for my $p (split (/,\s*/, "%2")) {
+ push (@p, sprintf ('<a href="https://packages.debian.org/src:%s">%s</a>', $p, $p));
+ }
+ print join (", ", @p);
+:></td></tr>
+</define-tag>
+
+<define-tag correction>
+ <tr><td><a href="https://packages.debian.org/src:%0">%0</a></td> <td>%1</td></tr>
+</define-tag>
+
+<define-tag srcpkg><a href="https://packages.debian.org/src:%0">%0</a></define-tag>
+
+<p>Debianprojektet presenterar stolt sin femte uppdatering till dess
+stabila utgåva Debian <release> (med kodnamnet <q><codename></q>).
+Denna punktutgåva lägger huvudsakligen till rättningar för säkerhetsproblem,
+tillsammans med ytterligare rättningar för allvarliga problem. Säkerhetsbulletiner
+har redan publicerats separat och refereras när de finns tillgängliga.</p>
+
+<p>Vänligen notera att punktutgåvan inte innebär en ny version av Debian
+<release> utan endast uppdaterar några av de inkluderade paketen. Det behövs
+inte kastas bort gamla media av <q><codename></q>. Efter installationen
+kan paket uppgraderas till de aktuella versionerna genom att använda en uppdaterad
+Debianspegling..</p>
+
+<p>De som frekvent installerar uppdateringar från security.debian.org kommer inte att behöva
+uppdatera många paket, och de flesta av sådana uppdateringar finns
+inkluderade i punktutgåvan.</p>
+
+<p>Nya installationsavbildningar kommer snart att finnas tillgängliga på de vanliga platserna.</p>
+
+<p>En uppgradering av en existerande installation till denna revision kan utföras genom att
+peka pakethanteringssystemet på en av Debians många HTTP-speglingar.
+En utförlig lista på speglingar finns på:</p>
+
+<div class="center">
+ <a href="$(HOME)/mirror/list">https://www.debian.org/mirror/list</a>
+</div>
+
+
+
+
+<h2>Blandade felrättningar</h2>
+
+<p>Denna uppdatering av den stabila utgåvan lägger till några viktiga felrättningar till följande paket:</p>
+
+<table border=0>
+<tr><th>Paket</th> <th>Orsak</th></tr>
+<correction apktool "Prevent arbitrary file writes with malicious resource names [CVE-2024-21633]">
+<correction atril "Fix crash when opening some epub files; fix index loading for certain epub documents; add fallback for malformed epub files in check_mime_type; use libarchive instead of external command for extracting documents [CVE-2023-51698]">
+<correction base-files "Update for the 12.5 point release">
+<correction caja "Fix desktop rendering artifacts after resolution changes; fix use of <q>informal</q> date format">
+<correction calibre "Fix <q>HTML Input: Don't add resources that exist outside the folder hierarchy rooted at the parent folder of the input HTML file by default</q> [CVE-2023-46303]">
+<correction compton "Remove recommendation of picom">
+<correction cryptsetup "cryptsetup-initramfs: Add support for compressed kernel modules; cryptsetup-suspend-wrapper: Don't error out on missing /lib/systemd/system-sleep directory; add_modules(): Change suffix drop logic to match initramfs-tools">
+<correction debian-edu-artwork "Provide an Emerald theme based artwork for Debian Edu 12">
+<correction debian-edu-config "New upstream release">
+<correction debian-edu-doc "Update included documentation and translations">
+<correction debian-edu-fai "New upstream release">
+<correction debian-edu-install "New upstream release; fix security sources.list">
+<correction debian-installer "Increase Linux kernel ABI to 6.1.0-18; rebuild against proposed-updates">
+<correction debian-installer-netboot-images "Rebuild against proposed-updates">
+<correction debian-ports-archive-keyring "Add Debian Ports Archive Automatic Signing Key (2025)">
+<correction dpdk "New upstream stable release">
+<correction dropbear "Fix <q>terrapin attack</q> [CVE-2023-48795]">
+<correction engrampa "Fix several memory leaks; fix archive <q>save as</q> functionality">
+<correction espeak-ng "Fix buffer overflow issues [CVE-2023-49990 CVE-2023-49992 CVE-2023-49993], buffer underflow issue [CVE-2023-49991], floating point exception issue [CVE-2023-49994]">
+<correction filezilla "Prevent <q>Terrapin</q> exploit [CVE-2023-48795]">
+<correction fish "Handle Unicode non-printing characters safely when given as command substitution [CVE-2023-49284]">
+<correction fssync "Disable flaky tests">
+<correction gnutls28 "Fix assertion failure when verifying a certificate chain with a cycle of cross signatures [CVE-2024-0567]; fix timing side-channel issue [CVE-2024-0553]">
+<correction indent "Fix buffer under read issue [CVE-2024-0911]">
+<correction isl "Fix use on older CPUs">
+<correction jtreg7 "New source package to support builds of openjdk-17">
+<correction libdatetime-timezone-perl "Update included timezone data">
+<correction libde265 "Fix buffer overflow issues [CVE-2023-49465 CVE-2023-49467 CVE-2023-49468]">
+<correction libfirefox-marionette-perl "Fix compatibility with newer firefox-esr versions">
+<correction libmateweather "Fix URL for aviationweather.gov">
+<correction libspreadsheet-parsexlsx-perl "Fix possible memory bomb [CVE-2024-22368]; fix XML External Entity issue [CVE-2024-23525]">
+<correction linux "New upstream stable release; bump ABI to 18">
+<correction linux-signed-amd64 "New upstream stable release; bump ABI to 18">
+<correction linux-signed-arm64 "New upstream stable release; bump ABI to 18">
+<correction linux-signed-i386 "New upstream stable release; bump ABI to 18">
+<correction localslackirc "Send authorization and cookie headers to the websocket">
+<correction mariadb "New upstream stable release; fix denial of service issue [CVE-2023-22084]">
+<correction mate-screensaver "Fix memory leaks">
+<correction mate-settings-daemon "Fix memory leaks; relax High DPI limits; fix handling of multiple rfkill events">
+<correction mate-utils "Fix various memory leaks">
+<correction monitoring-plugins "Fix check_http plugin when <q>--no-body</q> is used and the upstream response is chunked">
+<correction needrestart "Fix microcode check regression on AMD CPUs">
+<correction netplan.io "Fix autopkgtests with newer systemd versions">
+<correction nextcloud-desktop "Fix <q>fails to sync files with special chars like ':'</q>; fix two-factor authentication notifications">
+<correction node-yarnpkg "Fix use with Commander 8">
+<correction onionprobe "Fix initialisation of Tor if using hashed passwords">
+<correction pipewire "Use malloc_trim() when available to release memory">
+<correction pluma "Fix memory leak issues; fix double activation of extensions">
+<correction postfix "New upstream stable release; address SMTP smuggling issue [CVE-2023-51764]">
+<correction proftpd-dfsg "Implement fix for the Terrapin attack [CVE-2023-48795]; fix out-of-bounds read issue [CVE-2023-51713]">
+<correction proftpd-mod-proxy "Implement fix for the Terrapin attack [CVE-2023-48795]">
+<correction pypdf "Fix infinite loop issue [CVE-2023-36464]">
+<correction pypdf2 "Fix infinite loop issue [CVE-2023-36464]">
+<correction pypy3 "Avoid an rpython assertion error in the JIT if integer ranges don't overlap in a loop">
+<correction qemu "New upstream stable release; virtio-net: correctly copy vnet header when flushing TX [CVE-2023-6693]; fix null pointer dereference issue [CVE-2023-6683]; revert patch causing regressions in suspend / resume functionality">
+<correction rpm "Enable the read-only BerkeleyDB backend">
+<correction rss-glx "Install screensavers into /usr/libexec/xscreensaver; call GLFinish() prior to glXSwapBuffers()">
+<correction spip "Fix two cross-site scripting issues">
+<correction swupdate "Prevent acquiring root privileges through inappropriate socket mode">
+<correction systemd "New upstream stable release; fix missing verification issue in systemd-resolved [CVE-2023-7008]">
+<correction tar "Fix boundary checking in base-256 decoder [CVE-2022-48303], handling of extended header prefixes [CVE-2023-39804]">
+<correction tinyxml "Fix assertion issue [CVE-2023-34194]">
+<correction tzdata "New upstream stable release">
+<correction usb.ids "Update included data list">
+<correction usbutils "Fix usb-devices not printing all devices">
+<correction usrmerge "Clean up biarch directories when not needed; don't run convert-etc-shells again on converted systems; handle mounted /lib/modules on Xen systems; improve error reporting; add versioned conflicts with libc-bin, dhcpcd, libparted1.8-10 and lustre-utils">
+<correction wolfssl "Fix security issue when client sent neither PSK nor KSE extensions [CVE-2023-3724]">
+<correction xen "New upstream stable release; security fixes [CVE-2023-46837 CVE-2023-46839 CVE-2023-46840]">
+</table>
+
+
+<h2>Säkerhetsuppdateringar</h2>
+
+
+<p>Denna revision lägger till följande säkerhetsuppdateringar till den stabila utgåvan.
+Säkerhetsgruppen har redan släppt bulletiner för alla dessa
+uppdateringar:</p>
+
+<table border=0>
+<tr><th>Bulletin-ID</th> <th>Paket</th></tr>
+<dsa 2023 5572 roundcube>
+<dsa 2023 5573 chromium>
+<dsa 2023 5574 libreoffice>
+<dsa 2023 5576 xorg-server>
+<dsa 2023 5577 chromium>
+<dsa 2023 5578 ghostscript>
+<dsa 2023 5579 freeimage>
+<dsa 2023 5581 firefox-esr>
+<dsa 2023 5582 thunderbird>
+<dsa 2023 5583 gst-plugins-bad1.0>
+<dsa 2023 5584 bluez>
+<dsa 2023 5585 chromium>
+<dsa 2023 5586 openssh>
+<dsa 2023 5587 curl>
+<dsa 2023 5588 putty>
+<dsa 2023 5589 node-undici>
+<dsa 2023 5590 haproxy>
+<dsa 2023 5591 libssh>
+<dsa 2023 5592 libspreadsheet-parseexcel-perl>
+<dsa 2024 5593 linux-signed-amd64>
+<dsa 2024 5593 linux-signed-arm64>
+<dsa 2024 5593 linux-signed-i386>
+<dsa 2024 5593 linux>
+<dsa 2024 5595 chromium>
+<dsa 2024 5597 exim4>
+<dsa 2024 5598 chromium>
+<dsa 2024 5599 phpseclib>
+<dsa 2024 5600 php-phpseclib>
+<dsa 2024 5601 php-phpseclib3>
+<dsa 2024 5602 chromium>
+<dsa 2024 5603 xorg-server>
+<dsa 2024 5605 thunderbird>
+<dsa 2024 5606 firefox-esr>
+<dsa 2024 5607 chromium>
+<dsa 2024 5608 gst-plugins-bad1.0>
+<dsa 2024 5609 slurm-wlm>
+<dsa 2024 5610 redis>
+<dsa 2024 5611 glibc>
+<dsa 2024 5612 chromium>
+<dsa 2024 5613 openjdk-17>
+<dsa 2024 5614 zbar>
+<dsa 2024 5615 runc>
+</table>
+
+
+
+<h2>Debianinstalleraren</h2>
+<p>Installeraren har uppdaterats för att inkludera rättningarna som har inkluderats i den
+stabila utgåvan med denna punktutgåva.</p>
+
+<h2>URLer</h2>
+
+<p>Den fullständiga listan på paket som har förändrats i denna revision:</p>
+
+<div class="center">
+ <url "https://deb.debian.org/debian/dists/<downcase <codename>>/ChangeLog">
+</div>
+
+<p>Den aktuella stabila utgåvan:</p>
+
+<div class="center">
+ <url "https://deb.debian.org/debian/dists/stable/">
+</div>
+
+<p>Föreslagna uppdateringar till den stabila utgåvan:</p>
+
+<div class="center">
+ <url "https://deb.debian.org/debian/dists/proposed-updates">
+</div>
+
+<p>Information om den stabila utgåvan (versionsfakta, kända problem osv.):</p>
+
+<div class="center">
+ <a
+ href="$(HOME)/releases/stable/">https://www.debian.org/releases/stable/</a>
+</div>
+
+<p>Säkerhetsbulletiner och information:</p>
+
+<div class="center">
+ <a href="$(HOME)/security/">https://www.debian.org/security/</a>
+</div>
+
+<h2>Om Debian</h2>
+
+<p>Debianprojektet är en grupp utvecklare av Fri mjukvara som
+donerar sin tid och kraft för att producera det helt
+fria operativsystemet Debian.</p>
+
+<h2>Kontaktinformation</h2>
+
+<p>För ytterligare information, vänligen besök Debians webbplats på
+<a href="$(HOME)/">https://www.debian.org/</a>, skicka e-post till
+&lt;press@debian.org&gt;, eller kontakta gruppen för stabila utgåvor på
+&lt;debian-release@lists.debian.org&gt;.</p>
+
+
diff --git a/swedish/News/2024/2024021002.wml b/swedish/News/2024/2024021002.wml
new file mode 100644
index 00000000000..bae6cf5dbe3
--- /dev/null
+++ b/swedish/News/2024/2024021002.wml
@@ -0,0 +1,299 @@
+#use wml::debian::translation-check translation="9d41ab1625a3bbe9bf95b782d91e91b766a3f664"
+<define-tag pagetitle>Uppdaterad Debian 11; 11.9 utgiven</define-tag>
+<define-tag release_date>2024-02-10</define-tag>
+#use wml::debian::news
+
+<define-tag release>11</define-tag>
+<define-tag codename>bullseye</define-tag>
+<define-tag revision>11.9</define-tag>
+
+<define-tag dsa>
+ <tr><td align="center"><a href="$(HOME)/security/%0/dsa-%1">DSA-%1</a></td>
+ <td align="center"><:
+ my @p = ();
+ for my $p (split (/,\s*/, "%2")) {
+ push (@p, sprintf ('<a href="https://packages.debian.org/src:%s">%s</a>', $p, $p));
+ }
+ print join (", ", @p);
+:></td></tr>
+</define-tag>
+
+<define-tag correction>
+ <tr><td><a href="https://packages.debian.org/src:%0">%0</a></td> <td>%1</td></tr>
+</define-tag>
+
+<define-tag srcpkg><a href="https://packages.debian.org/src:%0">%0</a></define-tag>
+
+<p>Debianprojektet presenterar stolt sin nionde uppdatering till dess
+gamla stabila utgåva Debian <release> (med kodnamnet <q><codename></q>).
+Denna punktutgåva lägger huvudsakligen till rättningar för säkerhetsproblem,
+tillsammans med ytterligare rättningar för allvarliga problem. Säkerhetsbulletiner
+har redan publicerats separat och refereras när de finns tillgängliga.</p>
+
+<p>Vänligen notera att punktutgåvan inte innebär en ny version av Debian
+<release> utan endast uppdaterar några av de inkluderade paketen. Det behövs
+inte kastas bort gamla media av <q><codename></q>. Efter installationen
+kan paket uppgraderas till de aktuella versionerna genom att använda en uppdaterad
+Debianspegling..</p>
+
+<p>De som frekvent installerar uppdateringar från security.debian.org kommer inte att behöva
+uppdatera många paket, och de flesta av sådana uppdateringar finns
+inkluderade i punktutgåvan.</p>
+
+<p>Nya installationsavbildningar kommer snart att finnas tillgängliga på de vanliga platserna.</p>
+
+<p>En uppgradering av en existerande installation till denna revision kan utföras genom att
+peka pakethanteringssystemet på en av Debians många HTTP-speglingar.
+En utförlig lista på speglingar finns på:</p>
+
+<div class="center">
+ <a href="$(HOME)/mirror/list">https://www.debian.org/mirror/list</a>
+</div>
+
+
+
+
+<h2>Blandade felrättningar</h2>
+
+<p>Denna uppdatering av den gamla stabila utgåvan lägger till några viktiga felrättningar till följande paket:</p>
+
+<table border=0>
+<tr><th>Paket</th> <th>Orsak</th></tr>
+<correction axis "Filter out unsupported protocols in the client class ServiceFactory [CVE-2023-40743]">
+<correction base-files "Update for the 11.9 point release">
+<correction cifs-utils "Fix non-parallel builds">
+<correction compton "Remove recommendation of picom">
+<correction conda-package-handling "Skip unreliable tests">
+<correction conmon "Do not hang when forwarding container stdout/stderr with lots of output">
+<correction crun "Fix containers with systemd as their init system, when using newer kernel versions">
+<correction debian-installer "Increase Linux kernel ABI to 5.10.0-28; rebuild against proposed-updates">
+<correction debian-installer-netboot-images "Rebuild against proposed-updates">
+<correction debian-ports-archive-keyring "Add Debian Ports Archive Automatic Signing Key (2025)">
+<correction debian-security-support "Mark tor, consul and xen as end-of-life; limit samba support to non-AD DC use cases; match golang packages with regular expression; drop version-based checking; add chromium to security-support-ended.deb11; add tiles and libspring-java to security-support-limited">
+<correction debootstrap "Backport merged-/usr support changes from trixie: implement merged-/usr by post-merging, default to merged-/usr for suites newer than bookworm in all profiles">
+<correction distro-info "Update tests for distro-info-data 0.58+deb12u1, which adjusted Debian 7's EoL date">
+<correction distro-info-data "Add Ubuntu 24.04 LTS Noble Numbat; fix several End Of Life dates">
+<correction dpdk "New upstream stable release">
+<correction dropbear "Fix security measure bypass issue [CVE-2021-36369]; fix <q>terrapin</q> attack [CVE-2023-48795]">
+<correction exuberant-ctags "Fix arbitrary command execution issue [CVE-2022-4515]">
+<correction filezilla "Prevent <q>terrapin</q> exploit [CVE-2023-48795]">
+<correction gimp "Remove old versions of separately packaged dds plugin">
+<correction glib2.0 "Align with upstream stable fixes; fix denial of service issues [CVE-2023-32665 CVE-2023-32611 CVE-2023-29499 CVE-2023-32636]">
+<correction glibc "Fix a memory corruption in <q>qsort()</q> when using nontransitive comparison functions.">
+<correction gnutls28 "Security fix for timing sidechannel attack [CVE-2023-5981]">
+<correction imagemagick "Various security fixes [CVE-2021-20241 CVE-2021-20243 CVE-2021-20244 CVE-2021-20245 CVE-2021-20246 CVE-2021-20309 CVE-2021-3574 CVE-2021-39212 CVE-2021-4219 CVE-2022-1114 CVE-2022-28463 CVE-2022-32545 CVE-2022-32546]">
+<correction jqueryui "Fix cross-site scripting issue [CVE-2022-31160]">
+<correction knewstuff "Ensure correct ProvidersUrl to fix denial of service">
+<correction libdatetime-timezone-perl "Update included timezone data">
+<correction libde265 "Fix segmentation violation in the function <q>decoder_context::process_slice_segment_header</q> [CVE-2023-27102]; fix heap buffer overflow in the function <q>derive_collocated_motion_vectors</q> [CVE-2023-27103]; fix buffer over-read in <q>pic_parameter_set::dump</q> [CVE-2023-43887]; fix buffer overflow in the <q>slice_segment_header</q> function [CVE-2023-47471]; fix buffer overflow issues [CVE-2023-49465 CVE-2023-49467 CVE-2023-49468]">
+<correction libmateweather "Update included location data; update data server URL">
+<correction libpod "Fix incorrect handling of supplementary groups [CVE-2022-2989]">
+<correction libsolv "Enable zstd compression support">
+<correction libspreadsheet-parsexlsx-perl "Fix possible memory bomb [CVE-2024-22368]; fix XML External Entity issue [CVE-2024-23525]">
+<correction linux "New upstream stable release; increase ABI to 28">
+<correction linux-signed-amd64 "New upstream stable release; increase ABI to 28">
+<correction linux-signed-arm64 "New upstream stable release; increase ABI to 28">
+<correction linux-signed-i386 "New upstream stable release; increase ABI to 28">
+<correction llvm-toolchain-16 "New backported package to support builds of newer chromium versions; build-dep on <q>llvm-spirv</q> instead of <q>llvm-spirv-16</q>">
+<correction mariadb-10.5 "New upstream stable release; fix denial of service issue [CVE-2023-22084]">
+<correction minizip "Reject overflows of zip header fields [CVE-2023-45853]">
+<correction modsecurity-apache "Fix protection bypass issues [CVE-2022-48279 CVE-2023-24021]">
+<correction nftables "Fix incorrect bytecode generation">
+<correction node-dottie "Fix prototype pollution issue [CVE-2023-26132]">
+<correction node-url-parse "Fix authorisation bypass issue [CVE-2022-0512]">
+<correction node-xml2js "Fix prototype pollution issue [CVE-2023-0842]">
+<correction nvidia-graphics-drivers "New upstream release [CVE-2023-31022]">
+<correction nvidia-graphics-drivers-tesla-470 "New upstream release [CVE-2023-31022]">
+<correction opendkim "Properly delete Authentication-Results headers [CVE-2022-48521]">
+<correction perl "Prevent buffer overflow via illegal Unicode property [CVE-2023-47038]">
+<correction plasma-desktop "Fix denial of service bug in discover">
+<correction plasma-discover "Fix denial of service bug; fix build failure">
+<correction postfix "New upstream stable release; address SMTP smuggling issue [CVE-2023-51764]">
+<correction postgresql-13 "New upstream stable release; fix SQL injection issue [CVE-2023-39417]">
+<correction postgresql-common "Fix autopkgtests">
+<correction python-cogent "Skip parallel tests on single-CPU systems">
+<correction python-django-imagekit "Avoid triggering path traversal detection in tests">
+<correction python-websockets "Fix predictable duration issue [CVE-2021-33880]">
+<correction pyzoltan "Build on single core systems">
+<correction ruby-aws-sdk-core "Include VERSION file in package">
+<correction spip "Fix cross-site scripting issue">
+<correction swupdate "Prevent acquiring root privileges through inappropriate socket mode">
+<correction symfony "Ensure CodeExtension's filters properly escape their input [CVE-2023-46734]">
+<correction tar "Fix boundary checking in base-256 decoder [CVE-2022-48303], handling of extended header prefixes [CVE-2023-39804]">
+<correction tinyxml "Fix assertion issue [CVE-2023-34194]">
+<correction tzdata "Update included timezone data">
+<correction unadf "Fix stack buffer overflow issue [CVE-2016-1243]; fix arbitary code execution issue [CVE-2016-1244]">
+<correction usb.ids "Update included data list">
+<correction vlfeat "Fix FTBFS with newer ImageMagick">
+<correction weborf "Fix denial of service issue">
+<correction wolfssl "Fix buffer overflow issues [CVE-2022-39173 CVE-2022-42905], key disclosure issue [CVE-2022-42961], predictable buffer in input keying material [CVE-2023-3724]">
+<correction xerces-c "Fix use-after-free issue [CVE-2018-1311]; fix integer overflow issue [CVE-2023-37536]">
+<correction zeromq3 "Fix <q>fork()</q> detection with gcc 7; update copyright relicense statement">
+</table>
+
+
+<h2>Säkerhetsuppdateringar</h2>
+
+
+<p>Denna revision lägger till följande säkerhetsuppdateringar till den gamla stabila utgåvan.
+Säkerhetsgruppen har redan släppt bulletiner för alla dessa
+uppdateringar:</p>
+
+<table border=0>
+<tr><th>Bulletin-ID</th> <th>Paket</th></tr>
+<dsa 2023 5496 firefox-esr>
+<dsa 2023 5499 chromium>
+<dsa 2023 5506 firefox-esr>
+<dsa 2023 5508 chromium>
+<dsa 2023 5509 firefox-esr>
+<dsa 2023 5511 mosquitto>
+<dsa 2023 5512 exim4>
+<dsa 2023 5513 thunderbird>
+<dsa 2023 5514 glibc>
+<dsa 2023 5515 chromium>
+<dsa 2023 5516 libxpm>
+<dsa 2023 5517 libx11>
+<dsa 2023 5518 libvpx>
+<dsa 2023 5519 grub-efi-amd64-signed>
+<dsa 2023 5519 grub-efi-arm64-signed>
+<dsa 2023 5519 grub-efi-ia32-signed>
+<dsa 2023 5519 grub2>
+<dsa 2023 5520 mediawiki>
+<dsa 2023 5522 tomcat9>
+<dsa 2023 5523 curl>
+<dsa 2023 5524 libcue>
+<dsa 2023 5526 chromium>
+<dsa 2023 5527 webkit2gtk>
+<dsa 2023 5528 node-babel7>
+<dsa 2023 5530 ruby-rack>
+<dsa 2023 5531 roundcube>
+<dsa 2023 5533 gst-plugins-bad1.0>
+<dsa 2023 5534 xorg-server>
+<dsa 2023 5535 firefox-esr>
+<dsa 2023 5536 chromium>
+<dsa 2023 5537 openjdk-11>
+<dsa 2023 5538 thunderbird>
+<dsa 2023 5539 node-browserify-sign>
+<dsa 2023 5540 jetty9>
+<dsa 2023 5542 request-tracker4>
+<dsa 2023 5543 open-vm-tools>
+<dsa 2023 5544 zookeeper>
+<dsa 2023 5545 vlc>
+<dsa 2023 5546 chromium>
+<dsa 2023 5547 pmix>
+<dsa 2023 5548 openjdk-17>
+<dsa 2023 5549 trafficserver>
+<dsa 2023 5550 cacti>
+<dsa 2023 5551 chromium>
+<dsa 2023 5554 postgresql-13>
+<dsa 2023 5556 chromium>
+<dsa 2023 5557 webkit2gtk>
+<dsa 2023 5558 netty>
+<dsa 2023 5560 strongswan>
+<dsa 2023 5561 firefox-esr>
+<dsa 2023 5563 intel-microcode>
+<dsa 2023 5564 gimp>
+<dsa 2023 5565 gst-plugins-bad1.0>
+<dsa 2023 5566 thunderbird>
+<dsa 2023 5567 tiff>
+<dsa 2023 5569 chromium>
+<dsa 2023 5570 nghttp2>
+<dsa 2023 5571 rabbitmq-server>
+<dsa 2023 5572 roundcube>
+<dsa 2023 5573 chromium>
+<dsa 2023 5574 libreoffice>
+<dsa 2023 5576 xorg-server>
+<dsa 2023 5577 chromium>
+<dsa 2023 5579 freeimage>
+<dsa 2023 5581 firefox-esr>
+<dsa 2023 5582 thunderbird>
+<dsa 2023 5584 bluez>
+<dsa 2023 5585 chromium>
+<dsa 2023 5586 openssh>
+<dsa 2023 5587 curl>
+<dsa 2023 5588 putty>
+<dsa 2023 5590 haproxy>
+<dsa 2023 5591 libssh>
+<dsa 2023 5592 libspreadsheet-parseexcel-perl>
+<dsa 2024 5594 linux-signed-amd64>
+<dsa 2024 5594 linux-signed-arm64>
+<dsa 2024 5594 linux-signed-i386>
+<dsa 2024 5594 linux>
+<dsa 2024 5595 chromium>
+<dsa 2024 5597 exim4>
+<dsa 2024 5598 chromium>
+<dsa 2024 5599 phpseclib>
+<dsa 2024 5600 php-phpseclib>
+<dsa 2024 5602 chromium>
+<dsa 2024 5603 xorg-server>
+<dsa 2024 5604 openjdk-11>
+<dsa 2024 5605 thunderbird>
+<dsa 2024 5606 firefox-esr>
+<dsa 2024 5608 gst-plugins-bad1.0>
+<dsa 2024 5613 openjdk-17>
+<dsa 2024 5614 zbar>
+<dsa 2024 5615 runc>
+</table>
+
+
+<h2>Borttagna paket</h2>
+
+<p>Följande föråldrat paket har tagits bort från distributionen:</p>
+
+<table border=0>
+<tr><th>Paket</th> <th>Orsak</th></tr>
+<correction gimp-dds "Integrated in gimp >=2.10">
+
+</table>
+
+<h2>Debianinstalleraren</h2>
+<p>Installeraren har uppdaterats för att inkludera rättningarna som har inkluderats i den
+gamla stabila utgåvan med denna punktutgåva.</p>
+
+<h2>URLer</h2>
+
+<p>Den fullständiga listan på paket som har förändrats i denna revision:</p>
+
+<div class="center">
+ <url "https://deb.debian.org/debian/dists/<downcase <codename>>/ChangeLog">
+</div>
+
+<p>Den aktuella gamla stabila utgåvan:</p>
+
+<div class="center">
+ <url "https://deb.debian.org/debian/dists/oldstable/">
+</div>
+
+<p>Föreslagna uppdateringar till den gamla stabila utgåvan:</p>
+
+<div class="center">
+ <url "https://deb.debian.org/debian/dists/oldstable-proposed-updates">
+</div>
+
+<p>Information om den gamla stabila utgåvan (versionsfakta, kända problem osv.):</p>
+
+<div class="center">
+ <a
+ href="$(HOME)/releases/oldstable/">https://www.debian.org/releases/oldstable/</a>
+</div>
+
+<p>Säkerhetsbulletiner och information:</p>
+
+<div class="center">
+ <a href="$(HOME)/security/">https://www.debian.org/security/</a>
+</div>
+
+<h2>Om Debian</h2>
+
+<p>Debianprojektet är en grupp utvecklare av Fri mjukvara som
+donerar sin tid och kraft för att producera det helt
+fria operativsystemet Debian.</p>
+
+<h2>Kontaktinformation</h2>
+
+<p>För ytterligare information, vänligen besök Debians webbplats på
+<a href="$(HOME)/">https://www.debian.org/</a>, skicka e-post till
+&lt;press@debian.org&gt;, eller kontakta gruppen för stabila utgåvor på
+&lt;debian-release@lists.debian.org&gt;.</p>
+
+
diff --git a/swedish/News/2024/Makefile b/swedish/News/2024/Makefile
new file mode 100644
index 00000000000..97e6ae39374
--- /dev/null
+++ b/swedish/News/2024/Makefile
@@ -0,0 +1 @@
+include $(subst webwml/swedish,webwml/english,$(CURDIR))/Makefile
diff --git a/swedish/News/2024/index.wml b/swedish/News/2024/index.wml
new file mode 100644
index 00000000000..cbbc3250fc1
--- /dev/null
+++ b/swedish/News/2024/index.wml
@@ -0,0 +1,13 @@
+#use wml::debian::template title="Nyheter från 2024"
+#use wml::debian::recent_list
+#use wml::debian::translation-check translation="8c7eb4d215ef135ab7f71a83f3dfee0500f97e6c"
+
+<p><:= get_recent_list ('.', '0', '$(ENGLISHDIR)/News/2024', '',
+'\d+\w*') :></p>
+
+<p>Observera att du kan läsa de senaste Debiannyheterna genom att prenumerera
+på eller bläddra i arkiven för våra sändlistor
+<a href="https://lists.debian.org/debian-announce/debian-announce-2024/">\
+<strong>debian-announce</strong></a> och
+<a href="https://lists.debian.org/debian-news/">\
+<strong>debian-news</strong></a>.</p>

© 2014-2024 Faster IT GmbH | imprint | privacy policy