Lançada a 5º atualização do Debian Buster
Foi lançado o 5º upgrade do Debian Buster, chamado de Debian 10.5. Confira aqui quais foram as atualizações disponibilizadas neste upgrade e como atualizar seu Debian Buster.
O sistema de atualizações do Debian consiste em atualizações pontuais, com apenas um ou poucos pacotes, e de tempos em tempos saem atualizações maiores, com um maior número de pacotes atualizados. Estas versões não são consideradas um lançamento, mas sim complementos com melhorias e/ou atualizações de segurança. Entre o lançamento das versões são lançados vários upgrades. No Debian Stretch, por exemplo, foram lançadas 9 pacotes até o lançamento do Debian Buster e mais 4 até o momento, totalizando 13.
Como atualizar
Se você já está utilizando o Debian Buster, para obter este pacote de atualizações, basta atualizar pelo terminal, através do apt. A quantidade de pacotes a serem atualizados depende dos seus hábitos de usuário. Por exemplo, se você tem o costume de atualizar o sistema com frequência, provavelmente serão poucos pacotes à atualizar. Caso contrário, serão bastante pacotes.
Insira o comando abaixo para atualizar a lista de pacotes.
sudo apt update
Com o comando abaixo você irá instalar as atualizações disponíveis.
sudo apt full-upgrade
Aguarde o fim da instalação e seu sistema estará atualizado e com todas as correções de segurança.
Se não utiliza o Debian, mas ficou interessado, instale através da imagem ISO de instalação, que já está atualizada para a versão 10.5. Download abaixo:
amd64 (Gnome) | ||
---|---|---|
Live | Torrent | Mais… |
Pacotes atualizados
Segundo o que foi publicado no anúncio https://www.debian.org/News/2020/20200801 a lista de pacotes atualizados é a que está mostrada abaixo:
Todas as correções:
Package
Reason
[appstream-glib](https://packages.debian.org/src:appstream-glib)
Fix build failures in 2020 and later
[asunder](https://packages.debian.org/src:asunder)
Use gnudb instead of freedb by default
[b43-fwcutter](https://packages.debian.org/src:b43-fwcutter)
Ensure removal succeeds under non-English locales; do not fail removal if some files no longer exist; fix missing dependencies on pciutils and ca-certificates
[balsa](https://packages.debian.org/src:balsa)
Provide server identity when validating certificates, allowing successful validation when using the glib-networking patch for CVE-2020-13645
[base-files](https://packages.debian.org/src:base-files)
Update for the point release
[batik](https://packages.debian.org/src:batik)
Fix server-side request forgery via xlink:href attributes \[CVE-2019-17566\]
[borgbackup](https://packages.debian.org/src:borgbackup)
Fix index corruption bug leading to data loss
[bundler](https://packages.debian.org/src:bundler)
Update required version of ruby-molinillo
[c-icap-modules](https://packages.debian.org/src:c-icap-modules)
Add support for ClamAV 0.102
[cacti](https://packages.debian.org/src:cacti)
Fix issue where UNIX timestamps after September 13th 2020 were rejected as graph start / end; fix remote code execution \[CVE-2020-7237\], cross-site scripting \[CVE-2020-7106\], CSRF issue \[CVE-2020-13231\]; disabling a user account does not immediately invalidate permissions \[CVE-2020-13230\]
[calamares-settings-debian](https://packages.debian.org/src:calamares-settings-debian)
Enable displaymanager module, fixing autologin options; use xdg-user-dir to specify Desktop directory
[clamav](https://packages.debian.org/src:clamav)
New upstream release; security fixes \[CVE-2020-3327 CVE-2020-3341 CVE-2020-3350 CVE-2020-3327 CVE-2020-3481\]
[cloud-init](https://packages.debian.org/src:cloud-init)
New upstream release
[commons-configuration2](https://packages.debian.org/src:commons-configuration2)
Prevent object creation when loading YAML files \[CVE-2020-1953\]
[confget](https://packages.debian.org/src:confget)
Fix the Python module's handling of values containing \=
[dbus](https://packages.debian.org/src:dbus)
New upstream stable release; prevent a denial of service issue \[CVE-2020-12049\]; prevent use-after-free if two usernames share a uid
[debian-edu-config](https://packages.debian.org/src:debian-edu-config)
Fix loss of dynamically allocated IPv4 address
[debian-installer](https://packages.debian.org/src:debian-installer)
Update Linux ABI to 4.19.0-10
[debian-installer-netboot-images](https://packages.debian.org/src:debian-installer-netboot-images)
Rebuild against proposed-updates
[debian-ports-archive-keyring](https://packages.debian.org/src:debian-ports-archive-keyring)
Increase the expiration date of the 2020 key (84C573CD4E1AFD6C) by one year; add Debian Ports Archive Automatic Signing Key (2021); move the 2018 key (ID: 06AED62430CB581C) to the removed keyring
[debian-security-support](https://packages.debian.org/src:debian-security-support)
Update support status of several packages
[dpdk](https://packages.debian.org/src:dpdk)
New upstream release
[exiv2](https://packages.debian.org/src:exiv2)
Adjust overly restrictive security patch \[CVE-2018-10958 and CVE-2018-10999\]; fix denial of service issue \[CVE-2018-16336\]
[fdroidserver](https://packages.debian.org/src:fdroidserver)
Fix Litecoin address validation
[file-roller](https://packages.debian.org/src:file-roller)
Security fix \[CVE-2020-11736\]
[freerdp2](https://packages.debian.org/src:freerdp2)
Fix smartcard logins; security fixes \[CVE-2020-11521 CVE-2020-11522 CVE-2020-11523 CVE-2020-11524 CVE-2020-11525 CVE-2020-11526\]
[fwupd](https://packages.debian.org/src:fwupd)
New upstream release; fix possible signature verification issue \[CVE-2020-10759\]; use rotated Debian signing keys
[fwupd-amd64-signed](https://packages.debian.org/src:fwupd-amd64-signed)
New upstream release; fix possible signature verification issue \[CVE-2020-10759\]; use rotated Debian signing keys
[fwupd-arm64-signed](https://packages.debian.org/src:fwupd-arm64-signed)
New upstream release; fix possible signature verification issue \[CVE-2020-10759\]; use rotated Debian signing keys
[fwupd-armhf-signed](https://packages.debian.org/src:fwupd-armhf-signed)
New upstream release; fix possible signature verification issue \[CVE-2020-10759\]; use rotated Debian signing keys
[fwupd-i386-signed](https://packages.debian.org/src:fwupd-i386-signed)
New upstream release; fix possible signature verification issue \[CVE-2020-10759\]; use rotated Debian signing keys
[fwupdate](https://packages.debian.org/src:fwupdate)
Use rotated Debian signing keys
[fwupdate-amd64-signed](https://packages.debian.org/src:fwupdate-amd64-signed)
Use rotated Debian signing keys
[fwupdate-arm64-signed](https://packages.debian.org/src:fwupdate-arm64-signed)
Use rotated Debian signing keys
[fwupdate-armhf-signed](https://packages.debian.org/src:fwupdate-armhf-signed)
Use rotated Debian signing keys
[fwupdate-i386-signed](https://packages.debian.org/src:fwupdate-i386-signed)
Use rotated Debian signing keys
[gist](https://packages.debian.org/src:gist)
Avoid deprecated authorization API
[glib-networking](https://packages.debian.org/src:glib-networking)
Return bad identity error if identity is unset \[CVE-2020-13645\]; break balsa older than 2.5.6-2+deb10u1 as the fix for CVE-2020-13645 breaks balsa's certificate verification
[gnutls28](https://packages.debian.org/src:gnutls28)
Fix TL1.2 resumption errors; fix memory leak; handle zero length session tickets, fixing connection errors on TLS1.2 sessions to some big hosting providers; fix verification error with alternate chains
[intel-microcode](https://packages.debian.org/src:intel-microcode)
Downgrade some microcodes to previously issued versions, working around hangs on boot on Skylake-U/Y and Skylake Xeon E3
[jackson-databind](https://packages.debian.org/src:jackson-databind)
Fix multiple security issues affecting BeanDeserializerFactory \[CVE-2020-9548 CVE-2020-9547 CVE-2020-9546 CVE-2020-8840 CVE-2020-14195 CVE-2020-14062 CVE-2020-14061 CVE-2020-14060 CVE-2020-11620 CVE-2020-11619 CVE-2020-11113 CVE-2020-11112 CVE-2020-11111 CVE-2020-10969 CVE-2020-10968 CVE-2020-10673 CVE-2020-10672 CVE-2019-20330 CVE-2019-17531 and CVE-2019-17267\]
[jameica](https://packages.debian.org/src:jameica)
Add mckoisqldb to classpath, allowing use of SynTAX plugin
[jigdo](https://packages.debian.org/src:jigdo)
Fix HTTPS support in jigdo-lite and jigdo-mirror
[ksh](https://packages.debian.org/src:ksh)
Fix environment variable restriction issue \[CVE-2019-14868\]
[lemonldap-ng](https://packages.debian.org/src:lemonldap-ng)
Fix nginx configuration regression introduced by the fix for CVE-2019-19791
[libapache-mod-jk](https://packages.debian.org/src:libapache-mod-jk)
Rename Apache configuration file so it can be automatically enabled and disabled
[libclamunrar](https://packages.debian.org/src:libclamunrar)
New upstream stable release; add an unversioned meta-package
[libembperl-perl](https://packages.debian.org/src:libembperl-perl)
Handle error pages from Apache >= 2.4.40
[libexif](https://packages.debian.org/src:libexif)
Security fixes \[CVE-2020-12767 CVE-2020-0093 CVE-2020-13112 CVE-2020-13113 CVE-2020-13114\]; fix buffer overflow \[CVE-2020-0182\] and integer overflow \[CVE-2020-0198\]
[libinput](https://packages.debian.org/src:libinput)
Quirks: add trackpoint integration attribute
[libntlm](https://packages.debian.org/src:libntlm)
Fix buffer overflow \[CVE-2019-17455\]
[libpam-radius-auth](https://packages.debian.org/src:libpam-radius-auth)
Fix buffer overflow in password field \[CVE-2015-9542\]
[libunwind](https://packages.debian.org/src:libunwind)
Fix segfaults on mips; manually enable C++ exception support only on i386 and amd64
[libyang](https://packages.debian.org/src:libyang)
Fix cache corruption crash, CVE-2019-19333, CVE-2019-19334
[linux](https://packages.debian.org/src:linux)
New upstream stable release
[linux-latest](https://packages.debian.org/src:linux-latest)
Update for 4.19.0-10 kernel ABI
[linux-signed-amd64](https://packages.debian.org/src:linux-signed-amd64)
New upstream stable release
[linux-signed-arm64](https://packages.debian.org/src:linux-signed-arm64)
New upstream stable release
[linux-signed-i386](https://packages.debian.org/src:linux-signed-i386)
New upstream stable release
[lirc](https://packages.debian.org/src:lirc)
Fix conffile management
[mailutils](https://packages.debian.org/src:mailutils)
maidag: drop setuid privileges for all delivery operations but mda \[CVE-2019-18862\]
[mariadb-10.3](https://packages.debian.org/src:mariadb-10.3)
New upstream stable release; security fixes \[CVE-2020-2752 CVE-2020-2760 CVE-2020-2812 CVE-2020-2814 CVE-2020-13249\]; fix regression in RocksDB ZSTD detection
[mod-gnutls](https://packages.debian.org/src:mod-gnutls)
Fix a possible segfault on failed TLS handshake; fix test failures
[multipath-tools](https://packages.debian.org/src:multipath-tools)
kpartx: use correct path to partx in udev rule
[mutt](https://packages.debian.org/src:mutt)
Don't check IMAP PREAUTH encryption if $tunnel is in use
[mydumper](https://packages.debian.org/src:mydumper)
Link against libm
[nfs-utils](https://packages.debian.org/src:nfs-utils)
statd: take user-id from /var/lib/nfs/sm \[CVE-2019-3689\]; don't make /var/lib/nfs owned by statd
[nginx](https://packages.debian.org/src:nginx)
Fix error page request smuggling vulnerability \[CVE-2019-20372\]
[nmap](https://packages.debian.org/src:nmap)
Update default key size to 2048 bits
[node-dot-prop](https://packages.debian.org/src:node-dot-prop)
Fix regression introduced in CVE-2020-8116 fix
[node-handlebars](https://packages.debian.org/src:node-handlebars)
Disallow calling helperMissing and blockHelperMissing directly \[CVE-2019-19919\]
[node-minimist](https://packages.debian.org/src:node-minimist)
Fix prototype pollution \[CVE-2020-7598\]
[nvidia-graphics-drivers](https://packages.debian.org/src:nvidia-graphics-drivers)
New upstream stable release; security fixes \[CVE-2020-5963 CVE-2020-5967\]
[nvidia-graphics-drivers-legacy-390xx](https://packages.debian.org/src:nvidia-graphics-drivers-legacy-390xx)
New upstream stable release; security fixes \[CVE-2020-5963 CVE-2020-5967\]
[openstack-debian-images](https://packages.debian.org/src:openstack-debian-images)
Install resolvconf if installing cloud-init
[pagekite](https://packages.debian.org/src:pagekite)
Avoid issues with expiry of shipped SSL certificates by using those from the ca-certificates package
[pdfchain](https://packages.debian.org/src:pdfchain)
Fix crash at startup
[perl](https://packages.debian.org/src:perl)
Fix multiple regular expression related security issues \[CVE-2020-10543 CVE-2020-10878 CVE-2020-12723\]
[php-horde](https://packages.debian.org/src:php-horde)
Fix cross-site scripting vulnerability \[CVE-2020-8035\]
[php-horde-gollem](https://packages.debian.org/src:php-horde-gollem)
Fix cross-site scripting vulnerability in breadcrumb output \[CVE-2020-8034\]
[pillow](https://packages.debian.org/src:pillow)
Fix multiple out-of-bounds read issues \[CVE-2020-11538 CVE-2020-10378 CVE-2020-10177\]
[policyd-rate-limit](https://packages.debian.org/src:policyd-rate-limit)
Fix issues in accounting due to socket reuse
[postfix](https://packages.debian.org/src:postfix)
New upstream stable release; fix segfault in the tlsproxy client role when the server role was disabled; fix maillog\_file\_rotate\_suffix default value used the minute instead of the month; fix several TLS related issues; README.Debian fixes
[python-markdown2](https://packages.debian.org/src:python-markdown2)
Fix cross-site scripting issue \[CVE-2020-11888\]
[python3.7](https://packages.debian.org/src:python3.7)
Avoid infinite loop when reading specially crafted TAR files using the tarfile module \[CVE-2019-20907\]; resolve hash collisions for IPv4Interface and IPv6Interface \[CVE-2020-14422\]; fix denial of service issue in urllib.request.AbstractBasicAuthHandler \[CVE-2020-8492\]
[qdirstat](https://packages.debian.org/src:qdirstat)
Fix saving of user-configured MIME categories
[raspi3-firmware](https://packages.debian.org/src:raspi3-firmware)
Fix typo that could lead to unbootable systems
[resource-agents](https://packages.debian.org/src:resource-agents)
IPsrcaddr: make proto optional to fix regression when used without NetworkManager
[ruby-json](https://packages.debian.org/src:ruby-json)
Fix unsafe object creation vulnerability \[CVE-2020-10663\]
[shim](https://packages.debian.org/src:shim)
Use rotated Debian signing keys
[shim-helpers-amd64-signed](https://packages.debian.org/src:shim-helpers-amd64-signed)
Use rotated Debian signing keys
[shim-helpers-arm64-signed](https://packages.debian.org/src:shim-helpers-arm64-signed)
Use rotated Debian signing keys
[shim-helpers-i386-signed](https://packages.debian.org/src:shim-helpers-i386-signed)
Use rotated Debian signing keys
[speedtest-cli](https://packages.debian.org/src:speedtest-cli)
Pass correct headers to fix upload speed test
[ssvnc](https://packages.debian.org/src:ssvnc)
Fix out-of-bounds write \[CVE-2018-20020\], infinite loop \[CVE-2018-20021\], improper initialisation \[CVE-2018-20022\], potential denial-of-service \[CVE-2018-20024\]
[storebackup](https://packages.debian.org/src:storebackup)
Fix possible privilege escalation vulnerability \[CVE-2020-7040\]
[suricata](https://packages.debian.org/src:suricata)
Fix dropping privileges in nflog runmode
[tigervnc](https://packages.debian.org/src:tigervnc)
Don't use libunwind on armel, armhf or arm64
[transmission](https://packages.debian.org/src:transmission)
Fix possible denial of service issue \[CVE-2018-10756\]
[wav2cdr](https://packages.debian.org/src:wav2cdr)
Use C99 fixed-size integer types to fix runtime assertion on 64bit architectures other than amd64 and alpha
[zipios++](https://packages.debian.org/src:zipios++)
Security fix \[CVE-2019-13453\]
Atualizações de segurança
Advisory ID
Package
[DSA-4626](https://draft.blogger.com/security/2020/dsa-4626)
[php7.3](https://packages.debian.org/src:php7.3)
[DSA-4674](https://draft.blogger.com/security/2020/dsa-4674)
[roundcube](https://packages.debian.org/src:roundcube)
[DSA-4675](https://draft.blogger.com/security/2020/dsa-4675)
[graphicsmagick](https://packages.debian.org/src:graphicsmagick)
[DSA-4676](https://draft.blogger.com/security/2020/dsa-4676)
[salt](https://packages.debian.org/src:salt)
[DSA-4677](https://draft.blogger.com/security/2020/dsa-4677)
[wordpress](https://packages.debian.org/src:wordpress)
[DSA-4678](https://draft.blogger.com/security/2020/dsa-4678)
[firefox-esr](https://packages.debian.org/src:firefox-esr)
[DSA-4679](https://draft.blogger.com/security/2020/dsa-4679)
[keystone](https://packages.debian.org/src:keystone)
[DSA-4680](https://draft.blogger.com/security/2020/dsa-4680)
[tomcat9](https://packages.debian.org/src:tomcat9)
[DSA-4681](https://draft.blogger.com/security/2020/dsa-4681)
[webkit2gtk](https://packages.debian.org/src:webkit2gtk)
[DSA-4682](https://draft.blogger.com/security/2020/dsa-4682)
[squid](https://packages.debian.org/src:squid)
[DSA-4683](https://draft.blogger.com/security/2020/dsa-4683)
[thunderbird](https://packages.debian.org/src:thunderbird)
[DSA-4684](https://draft.blogger.com/security/2020/dsa-4684)
[libreswan](https://packages.debian.org/src:libreswan)
[DSA-4685](https://draft.blogger.com/security/2020/dsa-4685)
[apt](https://packages.debian.org/src:apt)
[DSA-4686](https://draft.blogger.com/security/2020/dsa-4686)
[apache-log4j1.2](https://packages.debian.org/src:apache-log4j1.2)
[DSA-4687](https://draft.blogger.com/security/2020/dsa-4687)
[exim4](https://packages.debian.org/src:exim4)
[DSA-4688](https://draft.blogger.com/security/2020/dsa-4688)
[dpdk](https://packages.debian.org/src:dpdk)
[DSA-4689](https://draft.blogger.com/security/2020/dsa-4689)
[bind9](https://packages.debian.org/src:bind9)
[DSA-4690](https://draft.blogger.com/security/2020/dsa-4690)
[dovecot](https://packages.debian.org/src:dovecot)
[DSA-4691](https://draft.blogger.com/security/2020/dsa-4691)
[pdns-recursor](https://packages.debian.org/src:pdns-recursor)
[DSA-4692](https://draft.blogger.com/security/2020/dsa-4692)
[netqmail](https://packages.debian.org/src:netqmail)
[DSA-4694](https://draft.blogger.com/security/2020/dsa-4694)
[unbound](https://packages.debian.org/src:unbound)
[DSA-4695](https://draft.blogger.com/security/2020/dsa-4695)
[firefox-esr](https://packages.debian.org/src:firefox-esr)
[DSA-4696](https://draft.blogger.com/security/2020/dsa-4696)
[nodejs](https://packages.debian.org/src:nodejs)
[DSA-4697](https://draft.blogger.com/security/2020/dsa-4697)
[gnutls28](https://packages.debian.org/src:gnutls28)
[DSA-4699](https://draft.blogger.com/security/2020/dsa-4699)
[linux-signed-amd64](https://packages.debian.org/src:linux-signed-amd64)
[DSA-4699](https://draft.blogger.com/security/2020/dsa-4699)
[linux-signed-arm64](https://packages.debian.org/src:linux-signed-arm64)
[DSA-4699](https://draft.blogger.com/security/2020/dsa-4699)
[linux-signed-i386](https://packages.debian.org/src:linux-signed-i386)
[DSA-4699](https://draft.blogger.com/security/2020/dsa-4699)
[linux](https://packages.debian.org/src:linux)
[DSA-4700](https://draft.blogger.com/security/2020/dsa-4700)
[roundcube](https://packages.debian.org/src:roundcube)
[DSA-4701](https://draft.blogger.com/security/2020/dsa-4701)
[intel-microcode](https://packages.debian.org/src:intel-microcode)
[DSA-4702](https://draft.blogger.com/security/2020/dsa-4702)
[thunderbird](https://packages.debian.org/src:thunderbird)
[DSA-4704](https://draft.blogger.com/security/2020/dsa-4704)
[vlc](https://packages.debian.org/src:vlc)
[DSA-4705](https://draft.blogger.com/security/2020/dsa-4705)
[python-django](https://packages.debian.org/src:python-django)
[DSA-4707](https://draft.blogger.com/security/2020/dsa-4707)
[mutt](https://packages.debian.org/src:mutt)
[DSA-4708](https://draft.blogger.com/security/2020/dsa-4708)
[neomutt](https://packages.debian.org/src:neomutt)
[DSA-4709](https://draft.blogger.com/security/2020/dsa-4709)
[wordpress](https://packages.debian.org/src:wordpress)
[DSA-4710](https://draft.blogger.com/security/2020/dsa-4710)
[trafficserver](https://packages.debian.org/src:trafficserver)
[DSA-4711](https://draft.blogger.com/security/2020/dsa-4711)
[coturn](https://packages.debian.org/src:coturn)
[DSA-4712](https://draft.blogger.com/security/2020/dsa-4712)
[imagemagick](https://packages.debian.org/src:imagemagick)
[DSA-4713](https://draft.blogger.com/security/2020/dsa-4713)
[firefox-esr](https://packages.debian.org/src:firefox-esr)
[DSA-4714](https://draft.blogger.com/security/2020/dsa-4714)
[chromium](https://packages.debian.org/src:chromium)
[DSA-4716](https://draft.blogger.com/security/2020/dsa-4716)
[docker.io](https://packages.debian.org/src:docker.io)
[DSA-4718](https://draft.blogger.com/security/2020/dsa-4718)
[thunderbird](https://packages.debian.org/src:thunderbird)
[DSA-4719](https://draft.blogger.com/security/2020/dsa-4719)
[php7.3](https://packages.debian.org/src:php7.3)
[DSA-4720](https://draft.blogger.com/security/2020/dsa-4720)
[roundcube](https://packages.debian.org/src:roundcube)
[DSA-4721](https://draft.blogger.com/security/2020/dsa-4721)
[ruby2.5](https://packages.debian.org/src:ruby2.5)
[DSA-4722](https://draft.blogger.com/security/2020/dsa-4722)
[ffmpeg](https://packages.debian.org/src:ffmpeg)
[DSA-4723](https://draft.blogger.com/security/2020/dsa-4723)
[xen](https://packages.debian.org/src:xen)
[DSA-4724](https://draft.blogger.com/security/2020/dsa-4724)
[webkit2gtk](https://packages.debian.org/src:webkit2gtk)
[DSA-4725](https://draft.blogger.com/security/2020/dsa-4725)
[evolution-data-server](https://packages.debian.org/src:evolution-data-server)
[DSA-4726](https://draft.blogger.com/security/2020/dsa-4726)
[nss](https://packages.debian.org/src:nss)
[DSA-4727](https://draft.blogger.com/security/2020/dsa-4727)
[tomcat9](https://packages.debian.org/src:tomcat9)
[DSA-4728](https://draft.blogger.com/security/2020/dsa-4728)
[qemu](https://packages.debian.org/src:qemu)
[DSA-4729](https://draft.blogger.com/security/2020/dsa-4729)
[libopenmpt](https://packages.debian.org/src:libopenmpt)
[DSA-4730](https://draft.blogger.com/security/2020/dsa-4730)
[ruby-sanitize](https://packages.debian.org/src:ruby-sanitize)
[DSA-4731](https://draft.blogger.com/security/2020/dsa-4731)
[redis](https://packages.debian.org/src:redis)
[DSA-4732](https://draft.blogger.com/security/2020/dsa-4732)
[squid](https://packages.debian.org/src:squid)
[DSA-4733](https://draft.blogger.com/security/2020/dsa-4733)
[qemu](https://packages.debian.org/src:qemu)
[DSA-4735](https://draft.blogger.com/security/2020/dsa-4735)
[grub-efi-amd64-signed](https://packages.debian.org/src:grub-efi-amd64-signed)
[DSA-4735](https://draft.blogger.com/security/2020/dsa-4735)
[grub-efi-arm64-signed](https://packages.debian.org/src:grub-efi-arm64-signed)
[DSA-4735](https://draft.blogger.com/security/2020/dsa-4735)
[grub-efi-ia32-signed](https://packages.debian.org/src:grub-efi-ia32-signed)
[DSA-4735](https://draft.blogger.com/security/2020/dsa-4735)
[grub2](https://packages.debian.org/src:grub2)
Pacotes removidos
Package
Reason
[golang-github-unknwon-cae](https://packages.debian.org/src:golang-github-unknwon-cae)
Security issues; unmaintained
[janus](https://packages.debian.org/src:janus)
Not supportable in stable
[mathematica-fonts](https://packages.debian.org/src:mathematica-fonts)
Relies on unavailable download location
[matrix-synapse](https://packages.debian.org/src:matrix-synapse)
Security issues; unsupportable
[selenium-firefoxdriver](https://packages.debian.org/src:selenium-firefoxdriver)
Incompatible with newer Firefox ESR versions