Search Blog Micronews Planet debian latest news news from 2021 news updated debian 11: 11.2 released Updated Debian 11: 11.2 released December 18th, 2021 The Debian project is pleased to announce the second update of its stable distribution Debian 11 (codename "bullseye"). This point release mainly adds corrections for security issues, along with a few adjustments for serious problems Security advisories have already been published separately and are referenced where available_ Please note that the point release does not constitute a new version of Debian 11 but only updates some of the packages included. There is no need to throw away old "bullseye" media. After installation, packages can be upgraded to the current versions using an up-to-date Debian mirror Those who frequently install updates from security debian org won't have to update many packages and most such updates are included in the point release_ New installation images will be available soon at the regular locations. Upgrading an existing installation to this revision can be achieved by pointing the package management system at one of Debian's many HTTP mirrors. A comprehensive list of mirrors is available at: htps IIWWdebian orglmirrorllist Miscellaneous Bugfixes This stable updlate adds a few important corrections to the following packages: Package Reason authheaders New upstream bug-fix release base-files Update Ietcldebian_ version for the 11.2 point release bpftrace Fix array indexing brltty Fix operation under X when using sysvinit btrbk Fix regression in the update for CVE-2021-38173 calibre Fix syntax error chrony Fix binding a socket to a network device with name longer than 3 characters when the system call filter is enabled cmake Add PostgreSQL 13 to known versions containerd New upstream stable release; handle ambiguous OCI manifest parsing [CVE- 2021-41190]; support "clone3" in default seccomp profile cun Remove -ffile-prefix-map from curl-config; fixing co-installability of libcurl4-gnutls- dev under multiarch datatablesjs Fix insufficient escaping of arrays passed to the HTML escape entities function [CVE-2021-23445]