December 18th, 2021 The Debian project is pleased to announce the second update of its stable distribution Debian (codename "bullseye"). This point release mainly adds corrections for security issues, along wit adjustments for serious problems. Security advisories have already been published separately referenced where available_ Please note that the point release does not constitute a new version of Debian 11 but only upd some of the packages included. There Is no need t0 throw away old "bullseye media After inst packages can be upgraded to the current versions using an up-to-date Debian mirror: Those who frequently install updates from security debian org won't have t0 update many and most such updates are included in the point release New installation images will be available soon at the regular locations Upgrading an existing installation to this revision can be achieved by pointing the package man system at one of Debian's many HTTP mirrors. A comprehensive list of mirrors is available at: bttps ILWW debian orglmirrorllist Miscellaneous Bugfixes This stable update adds a few important corrections to the following packages: Package Reason authheaders New upstream bug-fix release base-files Update Ietcldebian_version for the 11.2 point release bpftrace Fix array indexing brltty Fix operation under X when using sysvinit btrbk Fix regression in the update for CVE-2021-38173 calibre Fix syntax error chrony Fix binding a socket t0 a network device with a name longer than 3 characte when the system call filter is enabled cmake Add PostgreSQL 13 to known versions containerd New upstream stable release; handle ambiguous OCI manifest parsing [CV 2021-41190]; support "clone3" in default seccomp profile curl Remove -ffile-prefix-map from curl-config, fixing co-installability of libcurl4-g dev under multiarch datatablesis Fix insufficient escaping of arrays passed to the HTML escape entities funct [CVE-2021-23445] pack: