Advisories: Debian

Here are the latest security advisories for the Debian Linux distribution:

  • DSA-5958-1 jpeg-xl - security update
    Multiple vulnerabilities are discovered in jpeg-xl, the JPEG XL ("JXL") image coding library, including out of bounds read/write and stack based buffer overflow, which may cause excessive memory usage and denial of service attacks. CVE-2023-0645 Specifically crafted file could cause an out of bounds read in the exif handler of libjxl. CVE-2023-35790 Integer underflow in patch decoding code of libjxl. CVE-2024-11403 Out of bounds write in the JPEG decoder used for recompression of JPEG files. CVE-2024-11498 Specifically crafted file could cause the JPEG XL decoder to use large amounts of stack space, potentially exhausting the stack. https://security-tracker.debian.org/tracker/DSA-5958-1
  • DSA-5957-1 mediawiki - security update
    Multiple security issues were discovered in MediaWiki, a website engine for collaborative work, which could result in cross-site scripting, information disclosure, HTML injection or incorrect tracking of authentication events. https://security-tracker.debian.org/tracker/DSA-5957-1
  • DSA-5956-1 ring - security update
    The embedded copy of pjproject is affected by a buffer overflow vulnerability, which affects applications that use PJSIP DNS resolver. https://security-tracker.debian.org/tracker/DSA-5956-1
  • DSA-5955-1 chromium - security update
    Security issues were discovered in Chromium which could result in the execution of arbitrary code, denial of service, or information disclosure. Google is aware that an exploit for CVE-2025-6554 exists in the wild. https://security-tracker.debian.org/tracker/DSA-5955-1
  • DSA-5954-1 sudo - security update
    Rich Mirch discovered that sudo, a program designed to provide limited super user privileges to specific users, does not correctly handle the host (-h or --host) option. Due to a bug the host option was not restricted to listing privileges only and could be used when running a command via sudo or editing a file with sudoedit. Depending on the rules present in the sudoers file the flaw might allow a local privilege escalation attack. https://security-tracker.debian.org/tracker/DSA-5954-1
  • DSA-5953-1 catdoc - security update
    Several vulnerabilities were discovered in catdoc, a text extractor for MS-Office files, which may result in denial of service or the execution of arbitrary code if a specially crafted file is processed. https://security-tracker.debian.org/tracker/DSA-5953-1
  • DSA-5952-1 chromium - security update
    Security issues were discovered in Chromium which could result in the execution of arbitrary code, denial of service, or information disclosure. https://security-tracker.debian.org/tracker/DSA-5952-1
  • DSA-5951-1 icu - security update
    A buffer overflow was discovered in the International Components for Unicode (ICU) library. https://security-tracker.debian.org/tracker/DSA-5951-1
  • DSA-5950-1 firefox-esr - security update
    Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code. https://security-tracker.debian.org/tracker/DSA-5950-1
  • DSA-5949-1 libxml2 - security update
    Brief introduction Multiple memory related vulnerabilities, inlcuding use-after-free, out-of-bounds memory access and NULL pointer dereference, were discovered in GNOME XML Parser and Toolkit Library and its Python bindings, which may cause denial of service or other unintended behaviors. https://security-tracker.debian.org/tracker/DSA-5949-1
  • DSA-5948-1 trafficserver - security update
    Several vulnerabilities were discovered in Apache Traffic Server, a reverse and forward proxy server, which could result in denial of service, HTTP request smuggling or incorrect processing of ACLs. https://security-tracker.debian.org/tracker/DSA-5948-1
  • DSA-5947-1 xorg-server - security update
    Nils Emmerich discovered several vulnerabilities in the Xorg X server, which may result in privilege escalation if the X server is running privileged. https://security-tracker.debian.org/tracker/DSA-5947-1
  • DSA-5946-1 gdk-pixbuf - security update
    It was discovered that incorrect bounds validation in the GIF decoder of the GDK Pixbuf library may result in memory disclosure. https://security-tracker.debian.org/tracker/DSA-5946-1
  • DSA-5945-1 konsole - security update
    Dennis Dast discovered that the Konsole terminal emulator insecurely handled the telnet URI scheme, which could result in the execution of arbitrary code in some configurations. https://security-tracker.debian.org/tracker/DSA-5945-1
  • DSA-5944-1 chromium - security update
    Security issues were discovered in Chromium which could result in the execution of arbitrary code, denial of service, or information disclosure. https://security-tracker.debian.org/tracker/DSA-5944-1
  • DSA-5943-1 libblockdev - security update
    The Qualys Threat Research Unit (TRU) discovered a local privilege escalation vulnerability in libblockdev, a library for manipulating block devices. An "allow_active" user can exploit this flaw via the udisks daemon to obtain the full privileges of the root user. Details can be found in the Qualys advisory at https://www.qualys.com/2025/06/17/suse15-pam-udisks-lpe.txt Along with the libblockdev update, updated udisks2 packages are released, to enforce that private mounts are mounted with 'nodev,nosuid'. https://security-tracker.debian.org/tracker/DSA-5943-1
  • DSA-5942-1 chromium - security update
    Security issues were discovered in Chromium which could result in the execution of arbitrary code, denial of service, or information disclosure. https://security-tracker.debian.org/tracker/DSA-5942-1
  • DSA-5941-1 gst-plugins-bad1.0 - security update
    Multiple vulnerabilities were discovered in the H.265 plugin for the GStreamer media framework, which may result in denial of service or potentially the execution of arbitrary code if a malformed media file is opened. https://security-tracker.debian.org/tracker/DSA-5941-1
  • DSA-5940-1 modsecurity-apache - security update
    Several vulnerabilities were discovered in modsecurity-apache, an Apache module to tighten the Web application security, which may result in denial of service (high memory consumption). https://security-tracker.debian.org/tracker/DSA-5940-1
  • DSA-5939-1 gimp - security update
    Several vulnerabilities were discovered in GIMP, the GNU Image Manipulation Program, which could result in denial of service or potentially the execution of arbitrary code if malformed XCF, TGA, DDS, FLI or ICO files are opened. https://security-tracker.debian.org/tracker/DSA-5939-1
  • More...

Tell me what you are thinking?