aboutsummaryrefslogtreecommitdiffstats
path: root/arabic
diff options
context:
space:
mode:
authorMed <2029-med@users.noreply.salsa.debian.org>2021-12-19 09:33:26 +0000
committerMed <2029-med@users.noreply.salsa.debian.org>2021-12-19 09:33:26 +0000
commitfad94148d48d9c7981b8d5f3424709b452f5daef (patch)
tree68da94ad9089dd0e335b4e9ed05a74e06d954360 /arabic
parent56e25c88597e53d7003fc82bf2ef2d9a1cfd6262 (diff)
(ar) News/2021/20211218.wml, initial
Diffstat (limited to 'arabic')
-rw-r--r--arabic/News/2021/20211218.wml229
1 files changed, 229 insertions, 0 deletions
diff --git a/arabic/News/2021/20211218.wml b/arabic/News/2021/20211218.wml
new file mode 100644
index 00000000000..9adec359033
--- /dev/null
+++ b/arabic/News/2021/20211218.wml
@@ -0,0 +1,229 @@
+#use wml::debian::translation-check translation="43ee4d624248d2eac95a5997ba86398be35914ec" maintainer="med"
+<define-tag pagetitle>تحديث دبيان 11 : الإصدار 11.2</define-tag>
+<define-tag release_date>2021-12-18</define-tag>
+#use wml::debian::news
+
+<define-tag release>11</define-tag>
+<define-tag codename>bullseye</define-tag>
+<define-tag revision>11.2</define-tag>
+
+<define-tag dsa>
+ <tr><td align="center"><a href="$(HOME)/security/%0/dsa-%1">DSA-%1</a></td>
+ <td align="center"><:
+ my @p = ();
+ for my $p (split (/,\s*/, "%2")) {
+ push (@p, sprintf ('<a href="https://packages.debian.org/src:%s">%s</a>', $p, $p));
+ }
+ print join (", ", @p);
+:></td></tr>
+</define-tag>
+
+<define-tag correction>
+ <tr><td><a href="https://packages.debian.org/src:%0">%0</a></td> <td>%1</td></tr>
+</define-tag>
+
+<define-tag srcpkg><a href="https://packages.debian.org/src:%0">%0</a></define-tag>
+
+<p>
+يُسعد مشروع دبيان الإعلان عن التحديث الثاني لتوزيعته المستقرة دبيان <release> (الاسم الرمزي <q><codename></q>).
+بالإضافة إلى تسوية بعض المشكلات الحرجة يُصلح هذا التحديث بالأساس مشاكلات الأمان. تنبيهات الأمان أُعلنت بشكل منفصِل وفقط مُشار إليها في هذا الإعلان.
+</p>
+
+<p>
+يُرجى ملاحظة أن هذا التحديث لا يُشكّل إصدار جديد لدبيان <release> بل فقط تحديثات لبعض الحُزم المُضمّنة
+وبالتالي ليس بالضرورة رميُ الوسائط القديمة للإصدار <q><codename></q>، يمكن تحديث الحُزم باستخدام مرآة دبيان مُحدّثة.
+</p>
+
+<p>
+الذين يُثبّتون التحديثات من security.debian.org باستمرار لن يكون عليهم تحديث العديد من الحُزم،
+أغلب التحديثات مُضمّنة في هذا التحديث.
+</p>
+
+<p>
+صور جديدة لأقراص التثبيت ستكون متوفرة في موضِعها المعتاد.
+</p>
+
+<p>
+يمكن الترقية من تثبيت آنِيّ إلى هذه المراجعة بتوجيه نظام إدارة الحُزم إلى إحدى مرايا HTTP الخاصة بدبيان.
+قائمة شاملة لمرايا دبيان على المسار :
+</p>
+
+<div class="center">
+ <a href="$(HOME)/mirror/list">https://www.debian.org/mirror/list</a>
+</div>
+
+
+
+
+<h2>إصلاح العديد من العِلاّت</h2>
+
+<p>هذا التحديث للإصدار المستقر أضاف بعض الإصلاحات المهمة للحُزم التالية :</p>
+
+<table border=0>
+<tr><th>الحزمة</th> <th>السبب</th></tr>
+<correction authheaders "New upstream bug-fix release">
+<correction base-files "Update /etc/debian_version for the 11.2 point release">
+<correction bpftrace "Fix array indexing">
+<correction brltty "Fix operation under X when using sysvinit">
+<correction btrbk "Fix regression in the update for CVE-2021-38173">
+<correction calibre "Fix syntax error">
+<correction chrony "Fix binding a socket to a network device with a name longer than 3 characters when the system call filter is enabled">
+<correction cmake "Add PostgreSQL 13 to known versions">
+<correction containerd "New upstream stable release; handle ambiguous OCI manifest parsing [CVE-2021-41190]; support <q>clone3</q> in default seccomp profile">
+<correction curl "Remove -ffile-prefix-map from curl-config, fixing co-installability of libcurl4-gnutls-dev under multiarch">
+<correction datatables.js "Fix insufficient escaping of arrays passed to the HTML escape entities function [CVE-2021-23445]">
+<correction debian-edu-config "pxe-addfirmware: Fix TFTP server path; improve support for LTSP chroot setup and maintenance">
+<correction debian-edu-doc "Update Debian Edu Bullseye manual from the wiki; update translations">
+<correction debian-installer "Rebuild against proposed-updates; update kernel ABI to -10">
+<correction debian-installer-netboot-images "Rebuild against proposed-updates">
+<correction distro-info-data "Update included data for Ubuntu 14.04 and 16.04 ESM; add Ubuntu 22.04 LTS">
+<correction docker.io "Fix possible change of host file system permissions [CVE-2021-41089]; lock down file permissions in /var/lib/docker [CVE-2021-41091]; prevent credentials being sent to the default registry [CVE-2021-41092]; add support for <q>clone3</q> syscall in default seccomp policy">
+<correction edk2 "Address Boot Guard TOCTOU vulnerability [CVE-2019-11098]">
+<correction freeipmi "Install pkgconfig files to correct location">
+<correction gdal "Fix BAG 2.0 Extract support in LVBAG driver">
+<correction gerbv "Fix out-of-bounds write issue [CVE-2021-40391]">
+<correction gmp "Fix integer and buffer overflow issue [CVE-2021-43618]">
+<correction golang-1.15 "New upstream stable release; fix <q>net/http: panic due to racy read of persistConn after handler panic</q> [CVE-2021-36221]; fix <q>archive/zip: overflow in preallocation check can cause OOM panic</q> [CVE-2021-39293]; fix buffer over-run issue [CVE-2021-38297], out of bounds read issue [CVE-2021-41771], denial of service issues [CVE-2021-44716 CVE-2021-44717]">
+<correction grass "Fix parsing of GDAL formats where the description contains a colon">
+<correction horizon "Re-enable translations">
+<correction htmldoc "Fix buffer overflow issues [CVE-2021-40985 CVE-2021-43579]">
+<correction im-config "Prefer Fcitx5 over Fcitx4">
+<correction isync "Fix multiple buffer overflow issues [CVE-2021-3657]">
+<correction jqueryui "Fix untrusted code execution issues [CVE-2021-41182 CVE-2021-41183 CVE-2021-41184]">
+<correction jwm "Fix crash when using <q>Move</q> menu item">
+<correction keepalived "Fix overly broad DBus policy [CVE-2021-44225]">
+<correction keystone "Resolve information leak allowing determination of whether users exist [CVE-2021-38155]; apply some performance improvements to the default keystone-uwsgi.ini">
+<correction kodi "Fix buffer overflow in PLS playlists [CVE-2021-42917]">
+<correction libayatana-indicator "Scale icons when loading from file; prevent regular crashes in indicator applets">
+<correction libdatetime-timezone-perl "Update included data">
+<correction libencode-perl "Fix a memory leak in Encode.xs">
+<correction libseccomp "Add support for syscalls up to Linux 5.15">
+<correction linux "New upstream release; increase ABI to 10; RT: update to 5.10.83-rt58">
+<correction linux-signed-amd64 "New upstream release; increase ABI to 10; RT: update to 5.10.83-rt58">
+<correction linux-signed-arm64 "New upstream release; increase ABI to 10; RT: update to 5.10.83-rt58">
+<correction linux-signed-i386 "New upstream release; increase ABI to 10; RT: update to 5.10.83-rt58">
+<correction lldpd "Fix heap overflow issue [CVE-2021-43612]; do not set VLAN tag if client did not set it">
+<correction mrtg "Correct errors in variable names">
+<correction node-getobject "Resolve prototype pollution issue [CVE-2020-28282]">
+<correction node-json-schema "Resolve prototype pollution issue [CVE-2021-3918]">
+<correction open3d "Ensure that python3-open3d depends on python3-numpy">
+<correction opendmarc "Fix opendmarc-import; increase maximum supported length of tokens in ARC_Seal headers, resolving crashes">
+<correction plib "Fix integer overflow issue [CVE-2021-38714]">
+<correction plocate "Fix an issue where non-ASCII characters would be wrongly escaped">
+<correction poco "Fix installation of CMake files">
+<correction privoxy "Fix memory leaks [CVE-2021-44540 CVE-2021-44541 CVE-2021-44542]; fix cross-site scripting issue [CVE-2021-44543]">
+<correction publicsuffix "Update included data">
+<correction python-django "New upstream security release: fix potential bypass of an upstream access control based on URL paths [CVE-2021-44420]">
+<correction python-eventlet "Fix compatibility with dnspython 2">
+<correction python-virtualenv "Fix crash when using --no-setuptools">
+<correction ros-ros-comm "Fix denial of service issue [CVE-2021-37146]">
+<correction ruby-httpclient "Use system certificate store">
+<correction rustc-mozilla "New source package to support building of newer firefox-esr and thunderbird versions">
+<correction supysonic "Symlink jquery instead of loading it directly; correctly symlink minimized bootstrap CSS files">
+<correction tzdata "Update data for Fiji and Palestine">
+<correction udisks2 "Mount options: Always use errors=remount-ro for ext filesystems [CVE-2021-3802]; use the mkfs command to format exfat partitions; add Recommends exfatprogs as preferred alternative">
+<correction ulfius "Fix use of custom allocators with ulfius_url_decode and ulfius_url_encode">
+<correction vim "Fix heap overflows [CVE-2021-3770 CVE-2021-3778], use after free issue [CVE-2021-3796]; remove vim-gtk alternatives during vim-gtk -&gt; vim-gtk3 transition, easing upgrades from buster">
+<correction wget "Fix downloads over 2GB on 32-bit systems">
+</table>
+
+
+<h2>تحديثات الأمان</h2>
+
+
+<p>
+أضافت هذه المراجعة تحديثات الأمان التالية للإصدار المستقر.
+سبَق لفريق الأمان نشر تنبيه لكل تحديث :
+</p>
+
+<table border=0>
+<tr><th>مُعرَّف التنبيه</th> <th>الحزمة</th></tr>
+<dsa 2021 4980 qemu>
+<dsa 2021 4981 firefox-esr>
+<dsa 2021 4982 apache2>
+<dsa 2021 4983 neutron>
+<dsa 2021 4984 flatpak>
+<dsa 2021 4985 wordpress>
+<dsa 2021 4986 tomcat9>
+<dsa 2021 4987 squashfs-tools>
+<dsa 2021 4988 libreoffice>
+<dsa 2021 4989 strongswan>
+<dsa 2021 4992 php7.4>
+<dsa 2021 4994 bind9>
+<dsa 2021 4995 webkit2gtk>
+<dsa 2021 4996 wpewebkit>
+<dsa 2021 4998 ffmpeg>
+<dsa 2021 5002 containerd>
+<dsa 2021 5003 ldb>
+<dsa 2021 5003 samba>
+<dsa 2021 5004 libxstream-java>
+<dsa 2021 5007 postgresql-13>
+<dsa 2021 5008 node-tar>
+<dsa 2021 5009 tomcat9>
+<dsa 2021 5010 libxml-security-java>
+<dsa 2021 5011 salt>
+<dsa 2021 5013 roundcube>
+<dsa 2021 5016 nss>
+<dsa 2021 5017 xen>
+<dsa 2021 5019 wireshark>
+<dsa 2021 5020 apache-log4j2>
+<dsa 2021 5022 apache-log4j2>
+</table>
+
+
+
+<h2>مُثبِّت دبيان</h2>
+<p>
+حُدِّث المُثبِّت ليتضمن الإصلاحات المندرجة في هذا الإصدار المستقر.
+</p>
+
+<h2>المسارات</h2>
+
+<p>
+القائمة الكاملة للحُزم المُغيّرة في هذه المراجعة :
+</p>
+
+<div class="center">
+ <url "https://deb.debian.org/debian/dists/<downcase <codename>>/ChangeLog">
+</div>
+
+<p>التوزيعة المستقرة الحالية :</p>
+
+<div class="center">
+ <url "https://deb.debian.org/debian/dists/stable/">
+</div>
+
+<p>التحديثات المقترحة للتوزيعة المستقرة :</p>
+
+<div class="center">
+ <url "https://deb.debian.org/debian/dists/proposed-updates">
+</div>
+
+<p>معلومات حول التوزيعة المستقرة (ملاحظات الإصدار والأخطاء إلخ) :</p>
+
+<div class="center">
+ <a
+ href="$(HOME)/releases/stable/">https://www.debian.org/releases/stable/</a>
+</div>
+
+<p>معلومات وإعلانات الأمان :</p>
+
+<div class="center">
+ <a href="$(HOME)/security/">https://www.debian.org/security/</a>
+</div>
+
+<h2>حول دبيان</h2>
+
+<p>
+مشروع دبيان هو اتحاد لمطوري البرمجيات الحُرّة تطوعوا بالوقت والمجهود لإنتاج نظام تشعيل دبيان حُر بالكامل.
+</p>
+
+<h2>معلومات الاتصال</h2>
+
+<p>
+لمزيد من المعلومات يُرجى زيارة موقع دبيان
+<a href="$(HOME)/">https://www.debian.org/</a>
+أو إرسال بريد إلكتروني إلى &lt;press@debian.org&gt;
+أو الاتصال بفريق إصدار المستقرة على
+&lt;debian-release@lists.debian.org&gt;.
+</p>

© 2014-2024 Faster IT GmbH | imprint | privacy policy