aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorgalaxico <galatoulas@cti.gr>2021-08-25 03:05:32 +0300
committergalaxico <galatoulas@cti.gr>2021-08-25 03:05:32 +0300
commit1e203ddb0fc33b08be4b4d5a29354ae26ff686be (patch)
tree8415ce2d4d08bb9e81d950771fd92d2d3f8863a1
parentaeab779fb98ea69ea8605bf9a2e5a578f60faef2 (diff)
Debian 11 News release greek translation
-rw-r--r--greek/News/2021/20210206.wml236
-rw-r--r--greek/News/2021/20210327.wml203
-rw-r--r--greek/News/2021/20210619.wml273
-rw-r--r--greek/News/2021/20210812.wml47
-rw-r--r--greek/News/2021/20210814.wml273
-rw-r--r--greek/News/2021/20210815.wml195
-rw-r--r--greek/News/2021/Makefile1
-rw-r--r--greek/News/2021/index.wml14
8 files changed, 1242 insertions, 0 deletions
diff --git a/greek/News/2021/20210206.wml b/greek/News/2021/20210206.wml
new file mode 100644
index 00000000000..54eab1c417d
--- /dev/null
+++ b/greek/News/2021/20210206.wml
@@ -0,0 +1,236 @@
+#use wml::debian::translation-check translation="156615cc19b61bffcfb93a5ff5e5e300fcbc9492" maintainer="galaxico"
+<define-tag pagetitle>Updated Debian 10: 10.8 released</define-tag>
+<define-tag release_date>2021-02-06</define-tag>
+#use wml::debian::news
+
+<define-tag release>10</define-tag>
+<define-tag codename>buster</define-tag>
+<define-tag revision>10.8</define-tag>
+
+<define-tag dsa>
+ <tr><td align="center"><a href="$(HOME)/security/%0/dsa-%1">DSA-%1</a></td>
+ <td align="center"><:
+ my @p = ();
+ for my $p (split (/,\s*/, "%2")) {
+ push (@p, sprintf ('<a href="https://packages.debian.org/src:%s">%s</a>', $p, $p));
+ }
+ print join (", ", @p);
+:></td></tr>
+</define-tag>
+
+<define-tag correction>
+ <tr><td><a href="https://packages.debian.org/src:%0">%0</a></td> <td>%1</td></tr>
+</define-tag>
+
+<define-tag srcpkg><a href="https://packages.debian.org/src:%0">%0</a></define-tag>
+
+<p>The Debian project is pleased to announce the eighth update of its
+stable distribution Debian <release> (codename <q><codename></q>).
+This point release mainly adds corrections for security issues,
+along with a few adjustments for serious problems. Security advisories
+have already been published separately and are referenced where available.</p>
+
+<p>Please note that the point release does not constitute a new version of Debian
+<release> but only updates some of the packages included. There is
+no need to throw away old <q><codename></q> media. After installation,
+packages can be upgraded to the current versions using an up-to-date Debian
+mirror.</p>
+
+<p>Those who frequently install updates from security.debian.org won't have
+to update many packages, and most such updates are
+included in the point release.</p>
+
+<p>New installation images will be available soon at the regular locations.</p>
+
+<p>Upgrading an existing installation to this revision can be achieved by
+pointing the package management system at one of Debian's many HTTP mirrors.
+A comprehensive list of mirrors is available at:</p>
+
+<div class="center">
+ <a href="$(HOME)/mirror/list">https://www.debian.org/mirror/list</a>
+</div>
+
+
+
+
+<h2>Miscellaneous Bugfixes</h2>
+
+<p>This stable update adds a few important corrections to the following packages:</p>
+
+<table border=0>
+<tr><th>Package</th> <th>Reason</th></tr>
+<correction atftp "Fix denial of service issue [CVE-2020-6097]">
+<correction base-files "Update /etc/debian_version for the 10.8 point release">
+<correction ca-certificates "Update Mozilla CA bundle to 2.40, blacklist expired <q>AddTrust External Root</q>">
+<correction cacti "Fix SQL injection issue [CVE-2020-35701] and stored XSS issue">
+<correction cairo "Fix mask usage in image-compositor [CVE-2020-35492]">
+<correction choose-mirror "Update mirror list">
+<correction cjson "Fix infinite loop in cJSON_Minify">
+<correction clevis "Fix initramfs creation; clevis-dracut: Trigger initramfs creation upon installation">
+<correction cyrus-imapd "Fix version comparison in cron script">
+<correction debian-edu-config "Move host keytabs cleanup code out of gosa-modify-host into a standalone script, reducing LDAP calls to a single query">
+<correction debian-installer "Use 4.19.0-14 Linux kernel ABI; rebuild against proposed-updates">
+<correction debian-installer-netboot-images "Rebuild against proposed-updates">
+<correction debian-installer-utils "Support partitions on USB UAS devices">
+<correction device-tree-compiler "Fix segfault on <q>dtc -I fs /proc/device-tree</q>">
+<correction didjvu "Add missing build-dependency on tzdata">
+<correction dovecot "Fix crash when searching mailboxes containing malformed MIME messages">
+<correction dpdk "New upstream stable release">
+<correction edk2 "CryptoPkg/BaseCryptLib: fix NULL dereference [CVE-2019-14584]">
+<correction emacs "Don't crash with OpenPGP User IDs with no e-mail address">
+<correction fcitx "Fix input method support in Flatpaks">
+<correction file "Increase name recursion depth to 50 by default">
+<correction geoclue-2.0 "Check the maximum allowed accuracy level even for system applications; make the Mozilla API key configurable and use a Debian-specific key by default; fix display of the usage indicator">
+<correction gnutls28 "Fix test suite error caused by expired certificate">
+<correction grub2 "When upgrading grub-pc noninteractively, bail out if grub-install fails; explicitly check whether the target device exists before running grub-install; grub-install: Add backup and restore; don't call grub-install on fresh install of grub-pc">
+<correction highlight.js "Fix prototype pollution [CVE-2020-26237]">
+<correction intel-microcode "Update various microcode">
+<correction iproute2 "Fix bugs in JSON output; fix race condition that DOSes the system when using ip netns add at boot">
+<correction irssi-plugin-xmpp "Do not trigger the irssi core connect timeout prematurely, thus fixing STARTTLS connections">
+<correction libdatetime-timezone-perl "Update for new tzdata version">
+<correction libdbd-csv-perl "Fix test failure with libdbi-perl 1.642-1+deb10u2">
+<correction libdbi-perl "Security fix [CVE-2014-10402]">
+<correction libmaxminddb "Fix heap-based buffer over-read [CVE-2020-28241]">
+<correction lttng-modules "Fix build on kernel versions &gt;= 4.19.0-10">
+<correction m2crypto "Fix compatibility with OpenSSL 1.1.1i and newer">
+<correction mini-buildd "builder.py: sbuild call: set '--no-arch-all' explicitly">
+<correction net-snmp "snmpd: Add cacheTime and execType flags to EXTEND-MIB">
+<correction node-ini "Do not allow invalid hazardous string as section name [CVE-2020-7788]">
+<correction node-y18n "Fix prototype pollution issue [CVE-2020-7774]">
+<correction nvidia-graphics-drivers "New upstream release; fix possible denial of service and information disclosure [CVE-2021-1056]">
+<correction nvidia-graphics-drivers-legacy-390xx "New upstream release; fix possible denial of service and information disclosure [CVE-2021-1056]">
+<correction pdns "Security fixes [CVE-2019-10203 CVE-2020-17482]">
+<correction pepperflashplugin-nonfree "Turn into a dummy package taking care of removing the previously installed plugin (no longer functional nor supported)">
+<correction pngcheck "Fix buffer overflow [CVE-2020-27818]">
+<correction postgresql-11 "New upstream stable release; security fixes [CVE-2020-25694 CVE-2020-25695 CVE-2020-25696]">
+<correction postsrsd "Ensure timestamp tags aren't too long before trying to decode them [CVE-2020-35573]">
+<correction python-bottle "Stop allowing <q>;</q> as a query-string separator [CVE-2020-28473]">
+<correction python-certbot "Automatically use ACMEv2 API for renewals, to avoid issues with ACMEv1 API removal">
+<correction qxmpp "Fix potential SEGFAULT on connection error">
+<correction silx "python(3)-silx: Add dependency on python(3)-scipy">
+<correction slirp "Fix buffer overflows [CVE-2020-7039 CVE-2020-8608]">
+<correction steam "New upstream release">
+<correction systemd "journal: do not trigger assertion when journal_file_close() is passed NULL">
+<correction tang "Avoid race condition between keygen and update">
+<correction tzdata "New upstream release; update included timezone data">
+<correction unzip "Apply further fixes for CVE-2019-13232">
+<correction wireshark "Fix various crashes, infinite loops and memory leaks [CVE-2019-16319 CVE-2019-19553 CVE-2020-11647 CVE-2020-13164 CVE-2020-15466 CVE-2020-25862 CVE-2020-25863 CVE-2020-26418 CVE-2020-26421 CVE-2020-26575 CVE-2020-28030 CVE-2020-7045 CVE-2020-9428 CVE-2020-9430 CVE-2020-9431]">
+</table>
+
+
+<h2>Security Updates</h2>
+
+
+<p>This revision adds the following security updates to the stable release.
+The Security Team has already released an advisory for each of these
+updates:</p>
+
+<table border=0>
+<tr><th>Advisory ID</th> <th>Package</th></tr>
+<dsa 2020 4797 webkit2gtk>
+<dsa 2020 4801 brotli>
+<dsa 2020 4802 thunderbird>
+<dsa 2020 4803 xorg-server>
+<dsa 2020 4804 xen>
+<dsa 2020 4805 trafficserver>
+<dsa 2020 4806 minidlna>
+<dsa 2020 4807 openssl>
+<dsa 2020 4808 apt>
+<dsa 2020 4809 python-apt>
+<dsa 2020 4810 lxml>
+<dsa 2020 4811 libxstream-java>
+<dsa 2020 4812 xen>
+<dsa 2020 4813 firefox-esr>
+<dsa 2020 4814 xerces-c>
+<dsa 2020 4815 thunderbird>
+<dsa 2020 4816 mediawiki>
+<dsa 2020 4817 php-pear>
+<dsa 2020 4818 sympa>
+<dsa 2020 4819 kitty>
+<dsa 2020 4820 horizon>
+<dsa 2020 4821 roundcube>
+<dsa 2021 4822 p11-kit>
+<dsa 2021 4823 influxdb>
+<dsa 2021 4824 chromium>
+<dsa 2021 4825 dovecot>
+<dsa 2021 4827 firefox-esr>
+<dsa 2021 4828 libxstream-java>
+<dsa 2021 4829 coturn>
+<dsa 2021 4830 flatpak>
+<dsa 2021 4831 ruby-redcarpet>
+<dsa 2021 4832 chromium>
+<dsa 2021 4833 gst-plugins-bad1.0>
+<dsa 2021 4834 vlc>
+<dsa 2021 4835 tomcat9>
+<dsa 2021 4837 salt>
+<dsa 2021 4838 mutt>
+<dsa 2021 4839 sudo>
+<dsa 2021 4840 firefox-esr>
+<dsa 2021 4841 slurm-llnl>
+<dsa 2021 4843 linux-latest>
+<dsa 2021 4843 linux-signed-amd64>
+<dsa 2021 4843 linux-signed-arm64>
+<dsa 2021 4843 linux-signed-i386>
+<dsa 2021 4843 linux>
+</table>
+
+
+<h2>Removed packages</h2>
+
+<p>The following packages were removed due to circumstances beyond our control:</p>
+
+<table border=0>
+<tr><th>Package</th> <th>Reason</th></tr>
+<correction compactheader "Incompatible with current Thunderbird versions">
+
+</table>
+
+<h2>Debian Installer</h2>
+<p>The installer has been updated to include the fixes incorporated
+into stable by the point release.</p>
+
+<h2>URLs</h2>
+
+<p>The complete lists of packages that have changed with this revision:</p>
+
+<div class="center">
+ <url "http://ftp.debian.org/debian/dists/<downcase <codename>>/ChangeLog">
+</div>
+
+<p>The current stable distribution:</p>
+
+<div class="center">
+ <url "http://ftp.debian.org/debian/dists/stable/">
+</div>
+
+<p>Proposed updates to the stable distribution:</p>
+
+<div class="center">
+ <url "http://ftp.debian.org/debian/dists/proposed-updates">
+</div>
+
+<p>stable distribution information (release notes, errata etc.):</p>
+
+<div class="center">
+ <a
+ href="$(HOME)/releases/stable/">https://www.debian.org/releases/stable/</a>
+</div>
+
+<p>Security announcements and information:</p>
+
+<div class="center">
+ <a href="$(HOME)/security/">https://www.debian.org/security/</a>
+</div>
+
+<h2>About Debian</h2>
+
+<p>The Debian Project is an association of Free Software developers who
+volunteer their time and effort in order to produce the completely
+free operating system Debian.</p>
+
+<h2>Contact Information</h2>
+
+<p>For further information, please visit the Debian web pages at
+<a href="$(HOME)/">https://www.debian.org/</a>, send mail to
+&lt;press@debian.org&gt;, or contact the stable release team at
+&lt;debian-release@lists.debian.org&gt;.</p>
diff --git a/greek/News/2021/20210327.wml b/greek/News/2021/20210327.wml
new file mode 100644
index 00000000000..c843e451868
--- /dev/null
+++ b/greek/News/2021/20210327.wml
@@ -0,0 +1,203 @@
+#use wml::debian::translation-check translation="2a3fa2ac1b49f491737f3c89828986a43c00a61e" maintainer="galaxico"
+<define-tag pagetitle>Updated Debian 10: 10.9 released</define-tag>
+<define-tag release_date>2021-03-27</define-tag>
+#use wml::debian::news
+
+<define-tag release>10</define-tag>
+<define-tag codename>buster</define-tag>
+<define-tag revision>10.9</define-tag>
+
+<define-tag dsa>
+ <tr><td align="center"><a href="$(HOME)/security/%0/dsa-%1">DSA-%1</a></td>
+ <td align="center"><:
+ my @p = ();
+ for my $p (split (/,\s*/, "%2")) {
+ push (@p, sprintf ('<a href="https://packages.debian.org/src:%s">%s</a>', $p, $p));
+ }
+ print join (", ", @p);
+:></td></tr>
+</define-tag>
+
+<define-tag correction>
+ <tr><td><a href="https://packages.debian.org/src:%0">%0</a></td> <td>%1</td></tr>
+</define-tag>
+
+<define-tag srcpkg><a href="https://packages.debian.org/src:%0">%0</a></define-tag>
+
+<p>The Debian project is pleased to announce the ninth update of its
+stable distribution Debian <release> (codename <q><codename></q>).
+This point release mainly adds corrections for security issues,
+along with a few adjustments for serious problems. Security advisories
+have already been published separately and are referenced where available.</p>
+
+<p>Please note that the point release does not constitute a new version of Debian
+<release> but only updates some of the packages included. There is
+no need to throw away old <q><codename></q> media. After installation,
+packages can be upgraded to the current versions using an up-to-date Debian
+mirror.</p>
+
+<p>Those who frequently install updates from security.debian.org won't have
+to update many packages, and most such updates are
+included in the point release.</p>
+
+<p>New installation images will be available soon at the regular locations.</p>
+
+<p>Upgrading an existing installation to this revision can be achieved by
+pointing the package management system at one of Debian's many HTTP mirrors.
+A comprehensive list of mirrors is available at:</p>
+
+<div class="center">
+ <a href="$(HOME)/mirror/list">https://www.debian.org/mirror/list</a>
+</div>
+
+
+
+
+<h2>Miscellaneous Bugfixes</h2>
+
+<p>This stable update adds a few important corrections to the following packages:</p>
+
+<table border=0>
+<tr><th>Package</th> <th>Reason</th></tr>
+<correction avahi "Remove avahi-daemon-check-dns mechanism, which is no longer needed">
+<correction base-files "Update /etc/debian_version for the 10.9 point release">
+<correction cloud-init "Avoid logging generated passwords to world-readable log files [CVE-2021-3429]">
+<correction debian-archive-keyring "Add bullseye keys; retire jessie keys">
+<correction debian-installer "Use 4.19.0-16 Linux kernel ABI">
+<correction debian-installer-netboot-images "Rebuild against proposed-updates">
+<correction exim4 "Fix use of concurrent TLS connections under GnuTLS; fix TLS certificate verification with CNAMEs; README.Debian: document the limitation/extent of server certificate verification in the default configuration">
+<correction fetchmail "No longer report <q>System error during SSL_connect(): Success</q>; remove OpenSSL version check">
+<correction fwupd "Add SBAT support">
+<correction fwupd-amd64-signed "Add SBAT support">
+<correction fwupd-arm64-signed "Add SBAT support">
+<correction fwupd-armhf-signed "Add SBAT support">
+<correction fwupd-i386-signed "Add SBAT support">
+<correction fwupdate "Add SBAT support">
+<correction fwupdate-amd64-signed "Add SBAT support">
+<correction fwupdate-arm64-signed "Add SBAT support">
+<correction fwupdate-armhf-signed "Add SBAT support">
+<correction fwupdate-i386-signed "Add SBAT support">
+<correction gdnsd "Fix stack overflow with overly-large IPv6 addresses [CVE-2019-13952]">
+<correction groff "Rebuild against ghostscript 9.27">
+<correction hwloc-contrib "Enable support for the ppc64el architecture">
+<correction intel-microcode "Update various microcode">
+<correction iputils "Fix ping rounding errors; fix tracepath target corruption">
+<correction jquery "Fix untrusted code execution vulnerabilities [CVE-2020-11022 CVE-2020-11023]">
+<correction libbsd "Fix out-of-bounds read issue [CVE-2019-20367]">
+<correction libpano13 "Fix format string vulnerability">
+<correction libreoffice "Do not load encodings.py from current directoy">
+<correction linux "New upstream stable release; update ABI to -16; rotate secure boot signing keys; rt: update to 4.19.173-rt72">
+<correction linux-latest "Update to -15 kernel ABI; update for -16 kernel ABI">
+<correction linux-signed-amd64 "New upstream stable release; update ABI to -16; rotate secure boot signing keys; rt: update to 4.19.173-rt72">
+<correction linux-signed-arm64 "New upstream stable release; update ABI to -16; rotate secure boot signing keys; rt: update to 4.19.173-rt72">
+<correction linux-signed-i386 "New upstream stable release; update ABI to -16; rotate secure boot signing keys; rt: update to 4.19.173-rt72">
+<correction lirc "Normalize embedded ${DEB_HOST_MULTIARCH} value in /etc/lirc/lirc_options.conf to find unmodified configuration files on all architectures; recommend gir1.2-vte-2.91 instead of non-existent gir1.2-vte">
+<correction m2crypto "Fix test failure with recent OpenSSL versions">
+<correction openafs "Fix outgoing connections after unix epoch time 0x60000000 (14 January 2021)">
+<correction portaudio19 "Handle EPIPE from alsa_snd_pcm_poll_descriptors, fixing crash">
+<correction postgresql-11 "New upstream stable release; fix information leakage in constraint-violation error messages [CVE-2021-3393]; fix CREATE INDEX CONCURRENTLY to wait for concurrent prepared transactions">
+<correction privoxy "Security issues [CVE-2020-35502 CVE-2021-20209 CVE-2021-20210 CVE-2021-20211 CVE-2021-20212 CVE-2021-20213 CVE-2021-20214 CVE-2021-20215 CVE-2021-20216 CVE-2021-20217 CVE-2021-20272 CVE-2021-20273 CVE-2021-20275 CVE-2021-20276]">
+<correction python3.7 "Fix CRLF injection in http.client [CVE-2020-26116]; fix buffer overflow in PyCArg_repr in _ctypes/callproc.c [CVE-2021-3177]">
+<correction redis "Fix a series of integer overflow issues on 32-bit systems [CVE-2021-21309]">
+<correction ruby-mechanize "Fix command injection issue [CVE-2021-21289]">
+<correction systemd "core: make sure to restore the control command id, too, fixing a segfault; seccomp: allow turning off of seccomp filtering via an environment variable">
+<correction uim "libuim-data: Perform symlink_to_dir conversion of /usr/share/doc/libuim-data in the resurrected package for clean upgrades from stretch">
+<correction xcftools "Fix integer overflow vulnerability [CVE-2019-5086 CVE-2019-5087]">
+<correction xterm "Correct upper-limit for selection buffer, accounting for combining characters [CVE-2021-27135]">
+</table>
+
+
+<h2>Security Updates</h2>
+
+
+<p>This revision adds the following security updates to the stable release.
+The Security Team has already released an advisory for each of these
+updates:</p>
+
+<table border=0>
+<tr><th>Advisory ID</th> <th>Package</th></tr>
+<dsa 2021 4826 nodejs>
+<dsa 2021 4844 dnsmasq>
+<dsa 2021 4845 openldap>
+<dsa 2021 4846 chromium>
+<dsa 2021 4847 connman>
+<dsa 2021 4849 firejail>
+<dsa 2021 4850 libzstd>
+<dsa 2021 4851 subversion>
+<dsa 2021 4853 spip>
+<dsa 2021 4854 webkit2gtk>
+<dsa 2021 4855 openssl>
+<dsa 2021 4856 php7.3>
+<dsa 2021 4857 bind9>
+<dsa 2021 4858 chromium>
+<dsa 2021 4859 libzstd>
+<dsa 2021 4860 openldap>
+<dsa 2021 4861 screen>
+<dsa 2021 4862 firefox-esr>
+<dsa 2021 4863 nodejs>
+<dsa 2021 4864 python-aiohttp>
+<dsa 2021 4865 docker.io>
+<dsa 2021 4867 grub-efi-amd64-signed>
+<dsa 2021 4867 grub-efi-arm64-signed>
+<dsa 2021 4867 grub-efi-ia32-signed>
+<dsa 2021 4867 grub2>
+<dsa 2021 4868 flatpak>
+<dsa 2021 4869 tiff>
+<dsa 2021 4870 pygments>
+<dsa 2021 4871 tor>
+<dsa 2021 4872 shibboleth-sp>
+</table>
+
+
+
+<h2>Debian Installer</h2>
+<p>The installer has been updated to include the fixes incorporated
+into stable by the point release.</p>
+
+<h2>URLs</h2>
+
+<p>The complete lists of packages that have changed with this revision:</p>
+
+<div class="center">
+ <url "http://ftp.debian.org/debian/dists/<downcase <codename>>/ChangeLog">
+</div>
+
+<p>The current stable distribution:</p>
+
+<div class="center">
+ <url "http://ftp.debian.org/debian/dists/stable/">
+</div>
+
+<p>Proposed updates to the stable distribution:</p>
+
+<div class="center">
+ <url "http://ftp.debian.org/debian/dists/proposed-updates">
+</div>
+
+<p>stable distribution information (release notes, errata etc.):</p>
+
+<div class="center">
+ <a
+ href="$(HOME)/releases/stable/">https://www.debian.org/releases/stable/</a>
+</div>
+
+<p>Security announcements and information:</p>
+
+<div class="center">
+ <a href="$(HOME)/security/">https://www.debian.org/security/</a>
+</div>
+
+<h2>About Debian</h2>
+
+<p>The Debian Project is an association of Free Software developers who
+volunteer their time and effort in order to produce the completely
+free operating system Debian.</p>
+
+<h2>Contact Information</h2>
+
+<p>For further information, please visit the Debian web pages at
+<a href="$(HOME)/">https://www.debian.org/</a>, send mail to
+&lt;press@debian.org&gt;, or contact the stable release team at
+&lt;debian-release@lists.debian.org&gt;.</p>
+
+
diff --git a/greek/News/2021/20210619.wml b/greek/News/2021/20210619.wml
new file mode 100644
index 00000000000..28867daa99d
--- /dev/null
+++ b/greek/News/2021/20210619.wml
@@ -0,0 +1,273 @@
+#use wml::debian::translation-check translation="e381a4552e96e017684cf783d08d728d9ad833af" maintainer="galaxico"
+<define-tag pagetitle>Updated Debian 10: 10.10 released</define-tag>
+<define-tag release_date>2021-06-19</define-tag>
+#use wml::debian::news
+
+<define-tag release>10</define-tag>
+<define-tag codename>buster</define-tag>
+<define-tag revision>10.10</define-tag>
+
+<define-tag dsa>
+ <tr><td align="center"><a href="$(HOME)/security/%0/dsa-%1">DSA-%1</a></td>
+ <td align="center"><:
+ my @p = ();
+ for my $p (split (/,\s*/, "%2")) {
+ push (@p, sprintf ('<a href="https://packages.debian.org/src:%s">%s</a>', $p, $p));
+ }
+ print join (", ", @p);
+:></td></tr>
+</define-tag>
+
+<define-tag correction>
+ <tr><td><a href="https://packages.debian.org/src:%0">%0</a></td> <td>%1</td></tr>
+</define-tag>
+
+<define-tag srcpkg><a href="https://packages.debian.org/src:%0">%0</a></define-tag>
+
+<p>The Debian project is pleased to announce the tenth update of its
+stable distribution Debian <release> (codename <q><codename></q>).
+This point release mainly adds corrections for security issues,
+along with a few adjustments for serious problems. Security advisories
+have already been published separately and are referenced where available.</p>
+
+<p>Please note that the point release does not constitute a new version of Debian
+<release> but only updates some of the packages included. There is
+no need to throw away old <q><codename></q> media. After installation,
+packages can be upgraded to the current versions using an up-to-date Debian
+mirror.</p>
+
+<p>Those who frequently install updates from security.debian.org won't have
+to update many packages, and most such updates are
+included in the point release.</p>
+
+<p>New installation images will be available soon at the regular locations.</p>
+
+<p>Upgrading an existing installation to this revision can be achieved by
+pointing the package management system at one of Debian's many HTTP mirrors.
+A comprehensive list of mirrors is available at:</p>
+
+<div class="center">
+ <a href="$(HOME)/mirror/list">https://www.debian.org/mirror/list</a>
+</div>
+
+
+
+
+<h2>Miscellaneous Bugfixes</h2>
+
+<p>This stable update adds a few important corrections to the following packages:</p>
+
+<table border=0>
+<tr><th>Package</th> <th>Reason</th></tr>
+<correction apt "Accept suite name changes for repositories by default (e.g. stable -&gt; oldstable)">
+<correction awstats "Fix remote file access issues [CVE-2020-29600 CVE-2020-35176]">
+<correction base-files "Update /etc/debian_version for the 10.10 point release">
+<correction berusky2 "Fix segfault at startup">
+<correction clamav "New upstream stable release; fix denial of security issue [CVE-2021-1405]">
+<correction clevis "Fix support for TPMs that only support SHA256">
+<correction connman "dnsproxy: Check the length of buffers before memcpy [CVE-2021-33833]">
+<correction crmsh "Fix code execution issue [CVE-2020-35459]">
+<correction debian-installer "Use 4.19.0-17 Linux kernel ABI">
+<correction debian-installer-netboot-images "Rebuild against proposed-updates">
+<correction dnspython "XFR: do not attempt to compare to a non-existent <q>expiration</q> value">
+<correction dput-ng "Fix crash in the sftp uploader in case of EACCES from the server; update codenames; make <q>dcut dm</q> work for non-uploading DDs; fix a TypeError in http upload exception handling; don't try and construct uploader email from system hostname in .dak-commands files">
+<correction eterm "Fix code execution issue [CVE-2021-33477]">
+<correction exactimage "Fix build with C++11 and OpenEXR 2.5.x">
+<correction fig2dev "Fix buffer overflow [CVE-2021-3561]; several output fixes; rebuild testsuite during build and in autopkgtest">
+<correction fluidsynth "Fix use-after-free issue [CVE-2021-28421]">
+<correction freediameter "Fix denial of service issue [CVE-2020-6098]">
+<correction fwupd "Fix generation of the vendor SBAT string; stop using dpkg-dev in fwupd.preinst; new upstream stable version">
+<correction fwupd-amd64-signed "Sync with fwupd">
+<correction fwupd-arm64-signed "Sync with fwupd">
+<correction fwupd-armhf-signed "Sync with fwupd">
+<correction fwupd-i386-signed "Sync with fwupd">
+<correction fwupdate "Improve SBAT support">
+<correction fwupdate-amd64-signed "Sync with fwupdate">
+<correction fwupdate-arm64-signed "Sync with fwupdate">
+<correction fwupdate-armhf-signed "Sync with fwupdate">
+<correction fwupdate-i386-signed "Sync with fwupdate">
+<correction glib2.0 "Fix several integer overflow issues [CVE-2021-27218 CVE-2021-27219]; fix a symlink attack affecting file-roller [CVE-2021-28153]">
+<correction gnutls28 "Fix null-pointer dereference issue [CVE-2020-24659]; add several improvements to memory reallocation">
+<correction golang-github-docker-docker-credential-helpers "Fix double free issue [CVE-2019-1020014]">
+<correction htmldoc "Fix buffer overflow issues [CVE-2019-19630 CVE-2021-20308]">
+<correction ipmitool "Fix buffer overflow issues [CVE-2020-5208]">
+<correction ircii "Fix denial of service issue [CVE-2021-29376]">
+<correction isc-dhcp "Fix buffer overrun issue [CVE-2021-25217]">
+<correction isync "Reject <q>funny</q> mailbox names from IMAP LIST/LSUB [CVE-2021-20247]; fix handling of unexpected APPENDUID response code [CVE-2021-3578]">
+<correction jackson-databind "Fix external entity expansion issue [CVE-2020-25649] and several serialization-related issues [CVE-2020-24616 CVE-2020-24750 CVE-2020-35490 CVE-2020-35491 CVE-2020-35728 CVE-2020-36179 CVE-2020-36180 CVE-2020-36181 CVE-2020-36182 CVE-2020-36183 CVE-2020-36184 CVE-2020-36185 CVE-2020-36186 CVE-2020-36187 CVE-2020-36188 CVE-2020-36189 CVE-2021-20190]">
+<correction klibc "malloc: Set errno on failure; fix several overflow issues [CVE-2021-31873 CVE-2021-31870 CVE-2021-31872]; cpio: Fix possible crash on 64-bit systems [CVE-2021-31871]; {set,long}jmp [s390x]: save/restore the correct FPU registers">
+<correction libbusiness-us-usps-webtools-perl "Update to new US-USPS API">
+<correction libgcrypt20 "Fix weak ElGamal encryption with keys not generated by GnuPG/libgcrypt [CVE-2021-33560]">
+<correction libgetdata "Fix use after free issue [CVE-2021-20204]">
+<correction libmateweather "Adapt to renaming of America/Godthab to America/Nuuk in tzdata">
+<correction libxml2 "Fix out-of-bounds read in xmllint [CVE-2020-24977]; fix use-after-free issues in xmllint [CVE-2021-3516 CVE-2021-3518]; validate UTF8 in xmlEncodeEntities [CVE-2021-3517]; propagate error in xmlParseElementChildrenContentDeclPriv; fix exponential entity expansion attack [CVE-2021-3541]">
+<correction liferea "Fix compatibility with webkit2gtk &gt;= 2.32">
+<correction linux "New upstream stable release; increase ABI to 17; [rt] Update to 4.19.193-rt81">
+<correction linux-latest "Update to 4.19.0-17 ABI">
+<correction linux-signed-amd64 "New upstream stable release; increase ABI to 17; [rt] Update to 4.19.193-rt81">
+<correction linux-signed-arm64 "New upstream stable release; increase ABI to 17; [rt] Update to 4.19.193-rt81">
+<correction linux-signed-i386 "New upstream stable release; increase ABI to 17; [rt] Update to 4.19.193-rt81">
+<correction mariadb-10.3 "New upstream release; security fixes [CVE-2021-2154 CVE-2021-2166 CVE-2021-27928]; fix Innotop support; ship caching_sha2_password.so">
+<correction mqtt-client "Fix denial of service issue [CVE-2019-0222]">
+<correction mumble "Fix remote code execution issue [CVE-2021-27229]">
+<correction mupdf "Fix use-after-free issue [CVE-2020-16600] and double free issue [CVE-2021-3407]">
+<correction nmap "Update included MAC prefix list">
+<correction node-glob-parent "Fix regular expression denial of service issue [CVE-2020-28469]">
+<correction node-handlebars "Fix code execution issues [CVE-2019-20920 CVE-2021-23369]">
+<correction node-hosted-git-info "Fix regular expression denial of service issue [CVE-2021-23362]">
+<correction node-redis "Fix regular expression denial of service issue [CVE-2021-29469]">
+<correction node-ws "Fix regular expression-related denial of service issue [CVE-2021-32640]">
+<correction nvidia-graphics-drivers "Fix improper access control vulnerability [CVE-2021-1076]">
+<correction nvidia-graphics-drivers-legacy-390xx "Fix improper access control vulnerability [CVE-2021-1076]; fix installation failure on Linux 5.11 release candidates">
+<correction opendmarc "Fix heap overflow issue [CVE-2020-12460]">
+<correction openvpn "Fix <q>illegal client float</q> issue [CVE-2020-11810]; ensure key state is authenticated before sending push reply [CVE-2020-15078]; increase listen() backlog queue to 32">
+<correction php-horde-text-filter "Fix cross-site scripting issue [CVE-2021-26929]">
+<correction plinth "Use session to verify first boot welcome step">
+<correction ruby-websocket-extensions "Fix denial of service issue [CVE-2020-7663]">
+<correction rust-rustyline "Fix build with newer rustc">
+<correction rxvt-unicode "Disable ESC G Q escape sequence [CVE-2021-33477]">
+<correction sabnzbdplus "Fix code execution vulnerability [CVE-2020-13124]">
+<correction scrollz "Fix denial of service issue [CVE-2021-29376]">
+<correction shim "New upstream release; add SBAT support; fix i386 binary relocations; don't call QueryVariableInfo() on EFI 1.10 machines (e.g. older Intel Macs); fix handling of ignore_db and user_insecure_mode; add maintainer scripts to the template packages to manage installing and removing fbXXX.efi and mmXXX.efi when we install/remove the shim-helpers-$arch-signed packages; exit cleanly if installed on a non-EFI system; don't fail if debconf calls return errors">
+<correction shim-helpers-amd64-signed "Sync with shim">
+<correction shim-helpers-arm64-signed "Sync with shim">
+<correction shim-helpers-i386-signed "Sync with shim">
+<correction shim-signed "Update for new shim; multiple bugfixes in postinst and postrm handling; provide unsigned binaries for arm64 (see NEWS.Debian); exit cleanly if installed on a non-EFI system; don't fail if debconf calls return errors; fix documentation links; build against shim-unsigned 15.4-5~deb10u1; add explicit dependency from shim-signed to shim-signed-common">
+<correction speedtest-cli "Handle case where <q>ignoreids</q> is empty or contains empty ids">
+<correction tnef "Fix buffer over-read issue [CVE-2019-18849]">
+<correction uim "libuim-data: Copy <q>Breaks</q> from uim-data, fixing some upgrade scenarios">
+<correction user-mode-linux "Rebuild against Linux kernel 4.19.194-1">
+<correction velocity "Fix potential arbitrary code execution issue [CVE-2020-13936]">
+<correction wml "Fix regression in Unicode handling">
+<correction xfce4-weather-plugin "Move to version 2.0 met.no API">
+</table>
+
+
+<h2>Security Updates</h2>
+
+
+<p>This revision adds the following security updates to the stable release.
+The Security Team has already released an advisory for each of these
+updates:</p>
+
+<table border=0>
+<tr><th>Advisory ID</th> <th>Package</th></tr>
+<dsa 2021 4848 golang-1.11>
+<dsa 2021 4865 docker.io>
+<dsa 2021 4873 squid>
+<dsa 2021 4874 firefox-esr>
+<dsa 2021 4875 openssl>
+<dsa 2021 4877 webkit2gtk>
+<dsa 2021 4878 pygments>
+<dsa 2021 4879 spamassassin>
+<dsa 2021 4880 lxml>
+<dsa 2021 4881 curl>
+<dsa 2021 4882 openjpeg2>
+<dsa 2021 4883 underscore>
+<dsa 2021 4884 ldb>
+<dsa 2021 4885 netty>
+<dsa 2021 4886 chromium>
+<dsa 2021 4887 lib3mf>
+<dsa 2021 4888 xen>
+<dsa 2021 4889 mediawiki>
+<dsa 2021 4890 ruby-kramdown>
+<dsa 2021 4891 tomcat9>
+<dsa 2021 4892 python-bleach>
+<dsa 2021 4893 xorg-server>
+<dsa 2021 4894 php-pear>
+<dsa 2021 4895 firefox-esr>
+<dsa 2021 4896 wordpress>
+<dsa 2021 4898 wpa>
+<dsa 2021 4899 openjdk-11-jre-dcevm>
+<dsa 2021 4899 openjdk-11>
+<dsa 2021 4900 gst-plugins-good1.0>
+<dsa 2021 4901 gst-libav1.0>
+<dsa 2021 4902 gst-plugins-bad1.0>
+<dsa 2021 4903 gst-plugins-base1.0>
+<dsa 2021 4904 gst-plugins-ugly1.0>
+<dsa 2021 4905 shibboleth-sp>
+<dsa 2021 4907 composer>
+<dsa 2021 4908 libhibernate3-java>
+<dsa 2021 4909 bind9>
+<dsa 2021 4910 libimage-exiftool-perl>
+<dsa 2021 4912 exim4>
+<dsa 2021 4913 hivex>
+<dsa 2021 4914 graphviz>
+<dsa 2021 4915 postgresql-11>
+<dsa 2021 4916 prosody>
+<dsa 2021 4918 ruby-rack-cors>
+<dsa 2021 4919 lz4>
+<dsa 2021 4920 libx11>
+<dsa 2021 4921 nginx>
+<dsa 2021 4922 hyperkitty>
+<dsa 2021 4923 webkit2gtk>
+<dsa 2021 4924 squid>
+<dsa 2021 4925 firefox-esr>
+<dsa 2021 4926 lasso>
+<dsa 2021 4928 htmldoc>
+<dsa 2021 4929 rails>
+<dsa 2021 4930 libwebp>
+</table>
+
+
+<h2>Removed packages</h2>
+
+<p>The following packages were removed due to circumstances beyond our control:</p>
+
+<table border=0>
+<tr><th>Package</th> <th>Reason</th></tr>
+<correction sogo-connector "Incompatible with current Thunderbird versions">
+
+</table>
+
+<h2>Debian Installer</h2>
+<p>The installer has been updated to include the fixes incorporated
+into stable by the point release.</p>
+
+<h2>URLs</h2>
+
+<p>The complete lists of packages that have changed with this revision:</p>
+
+<div class="center">
+ <url "http://ftp.debian.org/debian/dists/<downcase <codename>>/ChangeLog">
+</div>
+
+<p>The current stable distribution:</p>
+
+<div class="center">
+ <url "http://ftp.debian.org/debian/dists/stable/">
+</div>
+
+<p>Proposed updates to the stable distribution:</p>
+
+<div class="center">
+ <url "http://ftp.debian.org/debian/dists/proposed-updates">
+</div>
+
+<p>stable distribution information (release notes, errata etc.):</p>
+
+<div class="center">
+ <a
+ href="$(HOME)/releases/stable/">https://www.debian.org/releases/stable/</a>
+</div>
+
+<p>Security announcements and information:</p>
+
+<div class="center">
+ <a href="$(HOME)/security/">https://www.debian.org/security/</a>
+</div>
+
+<h2>About Debian</h2>
+
+<p>The Debian Project is an association of Free Software developers who
+volunteer their time and effort in order to produce the completely
+free operating system Debian.</p>
+
+<h2>Contact Information</h2>
+
+<p>For further information, please visit the Debian web pages at
+<a href="$(HOME)/">https://www.debian.org/</a>, send mail to
+&lt;press@debian.org&gt;, or contact the stable release team at
+&lt;debian-release@lists.debian.org&gt;.</p>
+
+
diff --git a/greek/News/2021/20210812.wml b/greek/News/2021/20210812.wml
new file mode 100644
index 00000000000..9168c2fb505
--- /dev/null
+++ b/greek/News/2021/20210812.wml
@@ -0,0 +1,47 @@
+#use wml::debian::translation-check translation="a48c50faef33185d0ae2746854bc99435817bad1" maintainer="galaxico"
+<define-tag pagetitle>The Debian Project mourns the loss of Robert Lemmen, Karl Ramm and Rogério Theodoro de Brito</define-tag>
+<define-tag release_date>2021-08-12</define-tag>
+#use wml::debian::news
+
+<p>The Debian Project has lost several members of its
+community in the last year.</p>
+
+<p>
+In June 2020, Robert Lemmen passed away after a serious illness.
+Robert had been regularly attending the Debian Munich meetups since the
+early 00s and helped with local booths.
+He had been a Debian Developer since 2007. Among other contributions,
+he packaged modules for Raku (Perl6 at that time) and helped other
+contributors to get involved in the Raku Team.
+He also put effort into tracking down circular dependencies in Debian.
+</p>
+
+<p>
+Karl Ramm passed away in June 2020, after complications due to metastatic colon cancer.
+He had been a Debian Developer since 2001 and packaged several components of MIT's
+<a href="https://en.wikipedia.org/wiki/Project_Athena">Project Athena</a>.
+He was passionate about technology and Debian,
+and always interested in helping others to find and promote their passions.
+</p>
+
+<p>
+In April 2021, we lost Rogério Theodoro de Brito due to the COVID-19 pandemic.
+Rogério enjoyed coding small tools and had been a Debian contributor for more than 15 years.
+Among other projects, he contributed toward the use of Kurobox/Linkstation devices in Debian
+and maintained the youtube-dl tool. He also participated and was <q>Debian contact</q> in several upstream projects.
+</p>
+
+<p>The Debian Project honors Robert, Karl and Rogerio's good work and strong dedication to Debian
+and Free Software. Their contributions will not be forgotten, and the
+high standards of their work will continue to serve as an inspiration to
+others.</p>
+
+<h2>About Debian</h2>
+<p>The Debian Project is an association of Free Software developers who
+volunteer their time and effort in order to produce the completely free
+operating system Debian.</p>
+
+<h2>Contact Information</h2>
+<p>For further information, please visit the Debian web pages at
+<a href="$(HOME)/">http://www.debian.org/</a> or send mail to
+&lt;<a href="mailto:press@debian.org">press@debian.org</a>&gt;.</p>
diff --git a/greek/News/2021/20210814.wml b/greek/News/2021/20210814.wml
new file mode 100644
index 00000000000..3bcd4a4dc02
--- /dev/null
+++ b/greek/News/2021/20210814.wml
@@ -0,0 +1,273 @@
+#use wml::debian::translation-check translation="7ce619292bb7825470d6cb611887d68f405623ff" maintainer="galaxico"
+<define-tag pagetitle>Το Debian 11 <q>bullseye</q> κυκλοφόρησε!</define-tag>
+<define-tag release_date>2021-08-14</define-tag>
+#use wml::debian::news
+
+
+<p>Μετά από 2 χρόνια, 1 μήνα και 9 ημέρες ανάπτυξης, το Σχέδιο Debian
+παρουσιάζει με περηφάνεια την καινούρια του σταθερή έκδοση 11 (με το κωδικό όνομα <q>bullseye</q>),
+η οποία θα υποστηρίζεται για τα επόμενα 5 χρόνια χάρις στην συνδυαστική δουλειά της
+<a href="https://security-team.debian.org/">ομάδας ασφαλείας του Debian</a>
+και της ομάδας <a href="https://wiki.debian.org/LTS">Μακρόχρονης Υποστήριξης του Debian (Long Term Support)</a>.
+</p>
+
+<p>
+Το Debian 11 <q>bullseye</q> κυκλοφορεί με αρκετές εφαρμογές και περιβάλλοντα επιφάνειας γραφείου. Μεταξύ άλλων περιλαμβάνει
+τώρα τα περιβάλλοντα επιφάνειας γραφείου:
+</p>
+<ul>
+<li>Gnome 3.38,</li>
+<li>KDE Plasma 5.20,</li>
+<li>LXDE 11,</li>
+<li>LXQt 0.16,</li>
+<li>MATE 1.24,</li>
+<li>Xfce 4.16.</li>
+</ul>
+
+
+<p>Αυτή η κυκλοφορία περιέχει περισσότερα από 11.294 καινούρια πακέτα για έναν συνολικό αριθμό 59.551
+πακέτων, μαζί με μια σημαντική μείωση περισσότερων από 9.519 πακέτων που ήταν χαρακτηρισμένα ως
+<q>παρωχημένα</q> και αφαιρέθηκαν. 42.821 πακέτα επικαιροποιήθηκαν και 5.434 πακέτα παρέμειναν
+χωρίς αλλαγές.
+</p>
+
+<p>
+Η έκδοση <q>bullseye</q> είναι η πρώτη έκδοση που παρέχει έναν πυρήνα του Linux με υποστήριξη για το
+σύστημα αρχείων exFAT και το χρησιμοποιεί εξ ορισμού για την προσάρτηση συστημάτων αρχείων exFAT.
+Συνεπώς δεν απαιτείται πλέον να χρησιμοποιείτε την υλοποίηση filesystem-in-userspace που
+παρέχεται μέσω του πακέτου exfat-fuse package. Εργαλεία για τη δημιουργία και τον έλεγχο ενός
+συστήματος αρχείων exFAT παρέχονται με το πακέτο exfatprogs.
+</p>
+
+
+<p>
+Οι περισσότεροι σύγχρονοι εκτυπωτές μπορούν να εκτυπώνουν χωρίς την χρήση οδηγών (drivers) και να σαρώνουν χωρίς την
+ανάγκη για οδηγούς (συχνά μη ελεύθερους) των συγκεκριμένων κατασκευαστών.
+
+Η έκδοση <q>bullseye</q> φέρνει ένα καινούριο πακέτο, το ipp-usb, που χρησιμοποιεί το ανεξάρτητο από τον
+κατασκευαστή πρωτόκολλο IPP-over-USB το οποίο υποστηρίζεται από πολλούς σύγχρονους εκτυπωτές. Αυτό
+επιτρέπει σε μια συσκευή USB να χρησιμοποιείται ως μια δικτυακή συσκευή. Το επίσημο χωρίς οδηγό SANE backend
+προσφέρεται από το πρόγραμμα sane-escl στο πακέτο libsane1, που χρησιμοποιεί το πρωτόκολλο eSCL.
+</p>
+
+<p>
+Το systemd στην έκδοση <q>bullseye</q> ενεργοποιεί εξ ορισμού την persistent λειτουργικότητα του ημερολογίου (journal) με
+υπόρρητη fallback επιλογή το volatile storage. Αυτό επιτρέπει στους χρήστες που δεν βασίζονται σε
+ειδικά γνωρίσματα να απεγκαθιστούν παραδοσιακούς δαίμονες καταγραφής (logging) και να αλλάξουν
+στην χρήση μόνο του ημερολογίου (journal) του systemd.
+</p>
+
+<p>
+Η ομάδα του Debian Med έχει πάρει μέρος στον αγώνα ενάντια στην COVID-19
+δημιουργώντας πακέτα λογισμικού για την έρευνα του ιού στο επίπεδο της ακολουθίας (DNA)
+και στην μάχη εναντίον της πανδημίας με εργαλεία που χρησιμοποιούνται στην επιδημιολογία· αυτό
+το έργο θα συνεχιστεί με εστίαση σε εργαλεία μηχανικής μάθησης και στα δυο πεδία. Η δουλειά της
+ομάδας με την ομάδα Διασφάλισης Ποιότητας (Quality Assurance) και Συνεχούς ολοκλήρωσης (Continuous integration)
+είναι κρίσιμης σημασίας για την παραγωγή συνεπώς αναπαραγώμενων αποτελεσμάτων που απαιτούνται στις επιστήμες.
+
+Το Μείγμα Debian Med έχει ένα φάσμα εφαρμογών στις οποίες η απόδοση είναι κρίσιμης σημασίας και οι οποίες
+τώρα επωφελούνται από το SIMD Everywhere. Για να εγκαταστήσετε πακέτα που συντηρούνται από την ομάδα Debian Med,
+εγκαταστήστε τα μεταπακέτα με το πρόθεμα med-*, τα οποία βρίσκονται στην έκδοση 3.6.x.
+</p>
+
+<p>
+Τα Κινεζικά, Ιαπωνικά, Κορεάτικα και πολλές άλλες γλώσσες έχουν τώρα μια νέα Fcitx 5 μέθοδο εισαγωγής,η
+οποία είναι διάδοχος της δημοφιλούς μεθόδου Fcitx4 στην έκδοση <q>buster</q>· αυτή η νέα έκδοση έχει
+πολύ καλλίτερη υποστήριξη για πρόσθετων για το Wayland (ο προεπιλεγμένος διαχειριστής οθόνης).
+</p>
+
+<p>
+Το Debian 11 <q>bullseye</q> περιλαμβάνει ένα πλήθος επικαιροποιημένων πακέτων λογισμικού (πάνω από το
+72% όλων των πακέτων της προηγούμενης έκδοσης), τέτοια όπως:
+</p>
+<ul>
+<li>Apache 2.4.48</li>
+<li>BIND DNS Server 9.16</li>
+<li>Calligra 3.2</li>
+<li>Cryptsetup 2.3</li>
+<li>Emacs 27.1</li>
+<li>GIMP 2.10.22</li>
+<li>GNU Compiler Collection 10.2</li>
+<li>GnuPG 2.2.20</li>
+<li>Inkscape 1.0.2</li>
+<li>LibreOffice 7.0</li>
+<li>Linux kernel 5.10 series</li>
+<li>MariaDB 10.5</li>
+<li>OpenSSH 8.4p1</li>
+<li>Perl 5.32</li>
+<li>PHP 7.4</li>
+<li>PostgreSQL 13</li>
+<li>Python 3, 3.9.1</li>
+<li>Rustc 1.48</li>
+<li>Samba 4.13</li>
+<li>Vim 8.2</li>
+<li>περισσότερα από 59.000 άλλα έτοιμα για χρήση πακέτα, μεταγλωττισμένα από περισσότερα από
+30.000 πακέτα πηγαίου κώδικα.</li>
+</ul>
+
+<p>
+Με αυτή τη μεγάλη επιλογή πακέτων και την παραδοσιακά ευρεία υποστήριξη
+αρχιτεκτονικών, το Debian για μια ακόμα φορά παραμένει πιστό στον στόχο του
+να είναι <q>Το Οικουμενικό Λειτουργικό Σύστημα</q>. Είναι κατάλληλο για πολλές
+διαφορετικές περιπτώσεις χρήσης: από επιτραπέζια συστήματα μέχρι φορητούς υπολογιστές·
+από εξυπηρετητές ανάπτυξης μέχρι συστήματα Νέφους· όπως και για εξυπηρετητές βάσεων
+δεδομένων, web και αποθήκευσης. Την ίδια στιγμή, οι προσπάθειες διασφάλισης ποιότητας όπως
+οι αυτοματοποιημένες δοκιμές εγκατάστασης και αναβάθμισης για όλα τα πακέτα στην αρχειοθήκη
+του Debian εξασφαλίζουν ότι η έκδοση <q>bullseye</q> εκπληρώνει τις υψηλές προσδοκίες
+που έχουν οι χρήστες από μια σταθερή έκδοση του Debian.
+</p>
+
+<p>
+Συνολικά εννιά αρχιτεκτονικές υποστηρίζονται:
+64-bit PC / Intel EM64T / x86-64 (<code>amd64</code>),
+32-bit PC / Intel IA-32 (<code>i386</code>),
+64-bit little-endian Motorola/IBM PowerPC (<code>ppc64el</code>),
+64-bit IBM S/390 (<code>s390x</code>),
+για την ARM, <code>armel</code>
+και <code>armhf</code> για παλιότερα και πιο πρόσφατα 32-μπιτα συστήματα,
+και επιπλέον η <code>arm64</code> για την 64-μπιτη <q>AArch64</q> αρχιτεκτονική,
+και για την MIPS, η <code>mipsel</code> (little-endian) αρχιτεκτονική για 32-μπιτα συστήματα
+και η <code>mips64el</code> αρχιτεκτονική για 64-μπιτα little-endian συστήματα.
+</p>
+
+<h3>Θέλετε να τη δοκιμάσετε;</h3>
+<p>
+Αν απλά θέλετε να δοκιμάσετε την έκδοση Debian 11 <q>bullseye</q> χωρίς να την εγκαταστήσετε,
+μπορείτε να χρησιμοποιήσετε μια από τις διαθέσιμες <a href="$(HOME)/CD/live/">live εικόνες</a>
+που φορτώνουν και τρέχουν το πλήρες λειτουργικό σύστημα σε μια κατάσταση read-only
+στην μνήμη του υπολογιστή.
+</p>
+
+<p>
+Αυτές οι live εικόνες προσφέρονται για τις αρχιτεκτονικές <code>amd64</code> και
+<code>i386</code> και είναι διαθέσιμες σε διαμορφώσεις DVD, κλειδιών USB και netboot.
+Ο χρήστης μπορεί να διαλέξει για να δοκιμάσει ανάμεσα σε δαφορετικά περιβάλλοντα
+επιφάνειας εργασίας: GNOME, KDE Plasma, LXDE, LXQt, MATE, και Xfce.
+Το Debian Live <q>bullseye</q> έχει μια συνηθισμένη live εικόνα, οπότε είναι επίσης
+εφικτό να δοκιμάσετε ένα βασικό σύστημα Debian χωρίς κάποιες από τις γραφικές διεπαφές χρήστη.
+</p>
+
+<p>
+Αν απολαύσατε το λειτουργικό σύστημα έχετε την επιλογή να το εγκαταστήσετε
+από την live εικόνα στον σκληρό δίσκο του υπολογιστή σας. Η live εικόνα περιλαμβάνει
+τον ανεξάρτητο εγκαταστάτη Calamares καθώς και τον συνηθισμένο εγκαταστάτη του Debian.
+Περισσότερες πληροφορίες είναι διαθέσιμες στις ενότητες
+<a href="$(HOME)/releases/bullseye/releasenotes">Σημειώσεις της Έκδοσης</a> και
+<a href="$(HOME)/CD/live/">live εικόνες εγκατάστασης</a> του ιστότοπου του Debian.
+</p>
+
+<p>
+Για να εγκαταστήσετε το Debian 11 <q>bullseye</q> απευθείας στον σκληρό δίσκο του
+συστήματός σας μπορείτε να επιλέξετε από μια ποικιλία μέσως εγκατάστασης
+όπως δίσκους Blu-ray, DVD, CD, κλειδιά USB ή μέσω μιας δικτυακής σύνδεσης.
+Μέσω αυτών των εικόνων μπορούν να εγκατασταθούν αρκετά περιβάλλοντα επιφάνειας εργασίας &mdash; Cinnamon, GNOME, KDE Plasma Desktop and
+Applications, LXDE, LXQt, MATE και Xfce &mdash;.
+Επιπλέον, διατίθενται CD <q>πολλαπλών αρχιτεκτονικών</q> οι οποίες υποστηρίζουν
+την εγκατάσταση από μια επιλογή αρχιτεκτονικών από έναν μοναδικό δίσκο. Ή μπορείτε πάντα
+να δημιουργήσετε ένα εκκινήσιμο μέσο εγκατάστασης σε USB
+(δείτε τον <a href="$(HOME)/releases/bullseye/installmanual">Οδηγό Εγκατάστασης</a>
+για περισσότερες λεπτομέρειες).
+</p>
+
+# Translators: some text taken from /devel/debian-installer/News/2021/20210802
+
+<p>
+Έχει γίνει σημαντική ανάπτυξη του Εγκαταστάτη του Debian που έχει
+σαν αποτέλεσμα βελτιωμένη υποστήριξη υλικού καθώς και άλλα νέα γνωρίσματα.
+</p>
+<p>
+Σε μερικές περιπτώσεις, μια επιτυχημένη εγκατάσταση μπορεί να εξακολουθεί
+να έχει προβλήματα με την οθόνη κατά την επανεκκίνηση στο μόλις εγκαταστημένο σύστημα·
+για αυτές τις περιπτώσεις υπάρχουν
+<a href="https://www.debian.org/releases/bullseye/amd64/ch06s04#completing-installed-system">μερικές εναλλακτικές</a>
+που μπορούν να βοηθήσουν παρ' όλα αυτά στην είσοδο στο σύστημα.
+Υπάρχει επίσης μια
+<a href="https://www.debian.org/releases/bullseye/amd64/ch06s04#completing-installed-system">isenkram-based διαδικασία</a>
+που επιτρέπει στους χρήστες να ανιχνεύουν και να διορθώνουν υλισμικό που απουσιάζει από το σύστημά τους,
+με έναν αυτοματοποιημένο τρόπο. Φυσικά, κάποιος θα πρέπει να ζυγίσει τα υπέρ και τα κατά
+της χρήσης αυτού του εργαλείου μιας και είναι πολύ πιθανό ότι θα χρειαστεί την εγκατάσταση
+μη-ελεύθετων πακέτων.</p>
+
+<p>
+ Πέρα από αυτό, οι
+ <a href="https://cdimage.debian.org/cdimage/unofficial/non-free/cd-including-firmware/">non-free εικόνες του εγκαταστάτη
+ που περιλαμβάνουν πακέτα υλισμικού (firmware)</a> έχουν βελτιωθεί ώστε να μπορούν να προλαμβάνουν
+ τις ανάγκες σε υλισμικό για το εγκαταστημένο σύστημα (πχ. υλισμικό για κάρτες γραφικών AMD και Nvidia ή
+ νεώτερες γενιές υλικού για ήχο της Intel).
+</p>
+
+<p>
+Για χρήστες του Νέφους, το Debian προσφέρει άμεση υποστήριξη για πολλές από
+τις πιο γνωστές πλατφόρμες. Επίσημες εικόνες Debian επιλέγονται εύκολα
+μέσα από την κάθε "αγορά" εικόνων για Νέφος. Το Debian κυκλοφορεί επίσης <a
+href="https://cloud.debian.org/images/openstack/current/">προδημιουργημένες
+OpenStack εικόνες</a> για τις αρχιτεκτονικές <code>amd64</code> και <code>arm64</code>,
+έτοιμες για μεταφόρτωση και χρήση σε τοπικές διαμορφώσεις Νέφους.
+</p>
+
+<p>
+Το Debian μπορεί τώρα να εγκατασταθεί σε 76 γλώσσες, με τις περισσότερες
+διαθέσιμες τόσο σε βασισμένες σε κείμενο όσο και γραφικές διεπαφές χρήστη.
+</p>
+
+<p>
+Οι εικόνες εγκατάστασης μπορούν να μεταφορτωθούν αμέσως τώρα μέσω
+<a href="$(HOME)/CD/torrent-cd/">bittorrent</a> (η συνιστώμενη μέθοδος),
+<a href="$(HOME)/CD/jigdo-cd/#which">jigdo</a>, ή
+<a href="$(HOME)/CD/http-ftp/">HTTP</a>· δείτε τον σύνδεσμο
+<a href="$(HOME)/CD/">Debian on CDs</a> για περαιτέρω πληροφορίες. Η έκδοση <q>bullseye</q>
+θα είναι σύντομα διαθέσιμη επίσης σε φυσικούς δίσκους DVD, CD-ROM και Blu-ray από πολυάριθμους
+<a href="$(HOME)/CD/vendors">κατασκευαστές</a>.
+</p>
+
+
+<h3>Αναβαθμίζοντας το Debian</h3>
+<p>
+Αναβαθμίσεις στην έκδοση Debian 11 από την προηγούμενη έκδοση Debian 10
+(με το κωδικό όνομα <q>buster</q>) τις χειρίζεται, για τις περισσότερες διαμορφώσεις,
+ αυτόματα το εργαλείο διαχείρισης πακέτων APT.
+</p>
+
+<p>
+Για την έκδοση bullseye, η σουίτα ασφαλείας ονομάζεται τώρα bullseye-security
+και οι χρήστες θα πρέπει να προσαρμόσουν τα αρχεία των APT source-list αντίστοιχα όταν
+πραγματοποιούν μια αναβάθμιση. Αν οι ρυθμίσεις του APT περιλαμβάνουν επίσης "pinning" ή την επιλογή <code>APT::Default-Release</code>,
+είναι πιθανόν να χρειάζονται επίσης προσαρμογές. Δείτε την ενότητα
+<a href="https://www.debian.org/releases/bullseye/amd64/release-notes/ch-information#security-archive">Changed security archive layout</a>
+των Σημειώσεων της Έκδοσης για περισσότερες λεπτομέρειες.
+</p>
+
+<p>
+Αν κάνετα την αναβάθμιση από απόσταση, λάβετε υπόψιν την ενότητα
+<a href="$(HOME)/releases/bullseye/amd64/release-notes/ch-information#ssh-not-available">No new SSH connections possible during upgrade</a>.
+</p>
+
+<p>
+Όπως πάντα, τα συστήματα Debian μπορού να αναβαθμιστούν χωρίς κόπο, επί τόπου,
+χωρίς αναγκαστικό χρόνο διακοπής της λειτουργίας, αλλά συνιστάται έντονα να
+διαβάσετε τις <a href="$(HOME)/releases/bullseye/releasenotes">Σημειώσεις της Έκδοσης</a>
+καθώς και τον <a href="$(HOME)/releases/bullseye/installmanual">Οδηγό Εγκατάστασης</a>
+για πιθανά ζητήματα καθώς και για λεπτομερείς οδηγίες για την εγκατάσταση και την αναβάθμιση.
+Οι Σημειώσεις της Έκδοσης θα βελτιωθούν ακόμα περισσότερο και θα
+μεταφραστούν σε επιπλέον γλώσσες στις εβδομάδες μετά την κυκλοφορία της έκδοσης.
+</p>
+
+
+<h2>Σχετικά με το Debian</h2>
+
+<p>
+Το Debian είναι ένα ελεύθερο λειτουργικό σύστημα που αναπτύσσεται από χιλιάδες
+εθελοντές από ολόκληρο τον κόσμο που συνεργάζονται μέσω του Διαδικτύου. Τα κομβικά δυνατά σημεία του
+Debian είναι η βάση των εθελοντών του, η αφοσίωσή του στο Κοινωνικό του Συμβόλαιο και το Ελεύθερο Λογισμικό
+και η δέσμευσή του για την προσφορά του καλλίτερου δυνατού λειτουργικού συστήματος. Αυτή
+η καινούρια κυκλοφορία είναι άλλο ένα σημαντικό βήμα προς αυτή την κατεύθυνση.
+</p>
+
+
+<h2>Πληροφορίες Επικοινωνίας</h2>
+
+<p>
+Για περισσότετες πληροφορίες, παρακαλούμε επισκεφθείτε τις ιστοσελίδες του Debian στον ιστότοπο
+<a href="$(HOME)/">https://www.debian.org</a> ή στείλτε ένα ηλεκτρονικό μήνυμα στη διεύθυνση
+&lt;press@debian.org&gt;.
+</p>
diff --git a/greek/News/2021/20210815.wml b/greek/News/2021/20210815.wml
new file mode 100644
index 00000000000..1a8a59ee0a9
--- /dev/null
+++ b/greek/News/2021/20210815.wml
@@ -0,0 +1,195 @@
+#use wml::debian::translation-check translation="e7ce9859ec2794a8c0d0978182d2d513ed96cfa0" maintainer="galaxico"
+<define-tag pagetitle>Debian Edu / Skolelinux Bullseye — a complete Linux solution for your school</define-tag>
+<define-tag release_date>2021-08-15</define-tag>
+#use wml::debian::news
+
+<p>
+Are you the administrator for a computer lab or an entire school network?
+Would you like to install servers, workstations, and laptops to
+work together?
+Do you want the stability of Debian with network services already
+preconfigured?
+Do you wish to have a web-based tool to manage systems and several
+hundred or even more user accounts?
+Have you asked yourself if and how older computers could be used?
+</p>
+
+<p>
+Then Debian Edu is for you. The teachers themselves or their technical support
+can roll out a complete multi-user multi-machine study environment within
+a few days. Debian Edu comes with hundreds of applications pre-installed,
+and you can always add more packages from Debian.
+</p>
+
+<p>
+The Debian Edu developer team is happy to announce Debian Edu 11
+<q>Bullseye</q>, the Debian Edu / Skolelinux release based
+on the Debian 11 <q>Bullseye</q> release.
+Please consider testing it and reporting back (&lt;debian-edu@lists.debian.org&gt;)
+to help us to improve it further.
+</p>
+
+<h2>About Debian Edu and Skolelinux</h2>
+
+<p>
+<a href="https://blends.debian.org/edu"> Debian Edu, also known as
+Skolelinux</a>, is a Linux distribution based on Debian providing an
+out-of-the box environment of a completely configured school network.
+Immediately after installation, a school server running all services
+needed for a school network is set up just waiting for users and
+machines to be added via GOsa², a comfortable web interface.
+A netbooting environment is prepared, so after initial
+installation of the main server from CD / DVD / BD or USB stick all other
+machines can be installed via the network.
+Older computers (even up to ten or so years old) can be used as LTSP
+thin clients or diskless workstations, booting from the network without
+any installation and configuration at all.
+The Debian Edu school server provides an LDAP database and Kerberos
+authentication service, centralized home directories, a DHCP server, a web
+proxy and many other services. The desktop environment contains more than 70
+educational software packages and more are available from the Debian archive.
+Schools can choose between the desktop environments Xfce, GNOME, LXDE,
+MATE, KDE Plasma, Cinnamon and LXQt.
+</p>
+
+<h2>New features for Debian Edu 11 <q>Bullseye</q></h2>
+
+<p>These are some items from the release notes for Debian Edu 11 <q>Bullseye</q>,
+based on the Debian 11 <q>Bullseye</q> release.
+The full list including more detailed information is part of the related
+<a href="https://wiki.debian.org/DebianEdu/Documentation/Bullseye/Features#New_features_in_Debian_Edu_Bullseye">Debian Edu manual chapter</a>.
+</p>
+
+<ul>
+<li>
+New <a href="https://ltsp.org">LTSP</a> to support diskless workstations. Thin
+clients are still supported, now using <a href="https://wiki.x2go.org">X2Go</a>
+technology.
+</li>
+<li>
+Booting over the network is provided using iPXE instead of PXELINUX to be
+compliant with LTSP.
+</li>
+<li>
+The Debian Installer's graphical mode is used for iPXE installations.
+</li>
+<li>
+Samba is now configured as <q>standalone server</q> with support for SMB2/SMB3.
+</li>
+<li>
+DuckDuckGo is used as default search provider for both Firefox ESR and Chromium.
+</li>
+<li>
+New tool added to set up freeRADIUS with support for both EAP-TTLS/PAP and
+PEAP-MSCHAPV2 methods.
+</li>
+<li>
+Improved tool available to configure a new system with <q>Minimal</q> profile as
+dedicated gateway.
+</li>
+</ul>
+
+<h2>Download options, installation steps and manual</h2>
+
+<p>
+Official Debian Network-Installer CD images for both 64-bit and 32-bit PCs
+are available. The 32-bit image will only be needed in rare cases (for
+PCs older than around 15 years). The images can be downloaded at the following
+locations:
+</p>
+<ul>
+<li>
+<url http://get.debian.org/cdimage/release/current/amd64/iso-cd/>
+</li>
+<li>
+<url http://get.debian.org/cdimage/release/current/i386/iso-cd/>
+</li>
+</ul>
+
+<p>
+Alternatively official Debian BD images (more than 5 GB in size) are also
+available. It is possible to set up a whole Debian Edu network without an
+Internet connection (including all desktop environments and localization for all
+languages supported by Debian).
+These images can be downloaded at the following locations:
+</p>
+
+<ul>
+<li>
+<url http://get.debian.org/cdimage/release/current/amd64/iso-bd/>
+</li>
+<li>
+<url http://get.debian.org/cdimage/release/current/i386/iso-bd/>
+</li>
+</ul>
+
+<p>
+The images can be verified using the signed checksums provided in the download
+directory.
+<br />
+Once you've downloaded an image, you can check that
+<ul>
+<li>
+its checksum matches that expected from the checksum file; and that
+</li>
+<li>
+the checksum file has not been tampered with.
+</li>
+</ul>
+For more information about how to do these steps, read the
+<a href="https://www.debian.org/CD/verify">verification guide</a>.
+</p>
+
+<p>
+Debian Edu 11 <q>Bullseye</q> is entirely based on Debian 11 <q>Bullseye</q>;
+so the sources for all packages are available from the Debian archive.
+</p>
+
+<p>
+Please note the
+<a href="https://wiki.debian.org/DebianEdu/Status/Bullseye">Debian Edu Bullseye status page</a>.
+for always up-to-date information about Debian Edu 11 <q>Bullseye</q> including
+instructions how to use <code>rsync</code> for downloading the ISO images.
+</p>
+
+<p>
+When upgrading from Debian Edu 10 <q>Buster</q> please read the related
+<a href="https://wiki.debian.org/DebianEdu/Documentation/Bullseye/Upgrades">Debian Edu manual chapter</a>.
+</p>
+
+<p>
+For installation notes please read the related
+<a href="https://wiki.debian.org/DebianEdu/Documentation/Bullseye/Installation#Installing_Debian_Edu">Debian Edu manual chapter</a>.
+</p>
+
+<p>
+After installation you need to take these
+<a href="https://wiki.debian.org/DebianEdu/Documentation/Bullseye/GettingStarted">first steps</a>.
+</p>
+
+<p>
+Please see the <a href="https://wiki.debian.org/DebianEdu/Documentation/Bullseye/">Debian Edu wiki pages</a>
+for the latest English version of the Debian Edu <q>Bullseye</q> manual.
+The manual has been fully translated to German, French, Italian, Danish, Dutch,
+Norwegian Bokmål, Japanese, Simplified Chinese and Portuguese (Portugal).
+Partly translated versions exist for Spanish, Romanian and Polish.
+An overview of <a href="https://jenkins.debian.net/userContent/debian-edu-doc/">
+the latest published versions of the manual</a> is available.
+</p>
+
+<p>
+More information about Debian 11 <q>Bullseye</q> itself is provided in the
+release notes and the installation manual; see <a href="$(HOME)/">https://www.debian.org/</a>.
+</p>
+
+<h2>About Debian</h2>
+
+<p>The Debian Project is an association of Free Software developers who
+volunteer their time and effort in order to produce the completely free
+operating system Debian.</p>
+
+<h2>Contact Information</h2>
+
+<p>For further information, please visit the Debian web pages at
+<a href="$(HOME)/">https://www.debian.org/</a> or send mail to
+&lt;press@debian.org&gt;.</p>
diff --git a/greek/News/2021/Makefile b/greek/News/2021/Makefile
new file mode 100644
index 00000000000..c26323c0c92
--- /dev/null
+++ b/greek/News/2021/Makefile
@@ -0,0 +1 @@
+include $(subst webwml/greek,webwml/english,$(CURDIR))/Makefile
diff --git a/greek/News/2021/index.wml b/greek/News/2021/index.wml
new file mode 100644
index 00000000000..9cf02db20c0
--- /dev/null
+++ b/greek/News/2021/index.wml
@@ -0,0 +1,14 @@
+#use wml::debian::template title="Νέα του 2021"
+#use wml::debian::recent_list
+#use wml::debian::translation-check translation="2af6d80fe3502b92c36bbba14300afc5912e6e6c" maintainer="galaxico"
+
+<p><:= get_recent_list ('.', '0', '$(ENGLISHDIR)/News/2021', '',
+'\d+\w*') :></p>
+
+<p>Σημείωση: μπορείτε να έχετε τα πιο πρόσφατα νέα του Debian
+εγγραφόμενοι/ες ή περιηγούμενοι/ες την αρχειοθήκη των λιστών αλληλογραφίας
+<a
+href="https://lists.debian.org/debian-announce/debian-announce-2021/">\
+<strong>debian-announce</strong></a> και
+<a href="https://lists.debian.org/debian-news/">\
+<strong>debian-news</strong></a></p>

© 2014-2024 Faster IT GmbH | imprint | privacy policy