Multiple security issues were discovered in Thunderbird, which could result in denial of service or the execution of arbitrary code. For the stable distribution (bookworm), these problems have been fixed in
Archive for Debian Linux Distribution – Security Advisories
Security issues were discovered in Chromium which could result in the execution of arbitrary code, denial of service, or information disclosure.
Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code.
Amel Bouziane-Leblond discovered that insufficient validation of “vnd.libreoffice.command” URI schemes could result in the execution of arbitrary macro commands.
Jan-Niklas Sohn discovered several vulnerabilities in the Xorg X server, which may result in privilege escalation if the X server is running privileged.
Two security vulnerabilities were discovered in Emacs: CVE-2024-53920
A heap-based buffer overflow flaw in the decoding functions of openh264, a codec library which supports H.264 encoding and decoding, may allow a remote attacker to cause a denial of service or the execution of arbitrary code if a specially crafted video is processed.
Security issues were discovered in Chromium which could result in the execution of arbitrary code, denial of service, or information disclosure.
The Qualys Threat Research Unit (TRU) discovered that the OpenSSH client is vulnerable to a machine-in-the-middle attack if the VerifyHostKeyDNS option is enabled (disabled by default).
Bing Shi reported a flaw in GnuTLS, a library implementing the TLS and SSL protocols. Inefficient processing of certificates containing numerous names or name constraints may result in a denial of service.
Security issues were discovered in Chromium which could result in the execution of arbitrary code, denial of service, or information disclosure.
The following vulnerabilities have been discovered in the WebKitGTK web engine: CVE-2025-24143
Two vulnerabilities were discovered in pam-pkcs11, a PAM module which allows to use PKCS#11 based smart cards in the PAM authentication stack, which may allow to bypass the authentication in some scenarios.
Bing Shi reported a flaw in Libtasn1, a library to manage ASN.1 structures. Inefficient processing of input DER data containing a large number of SEQUENCE OF or SET OF elements, may result in a denial of service.
Multiple security vulnerabilities have been discovered in Cacti, a web interface for graphing of monitoring systems, which could result in cross-site scripting, SQL injection, or command injection.
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.
Multiple security issues were discovered in Thunderbird, which could result in the execution of arbitrary code. For the stable distribution (bookworm), these problems have been fixed in
Security issues were discovered in Chromium which could result in the execution of arbitrary code, denial of service, or information disclosure.
Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code.
A vulnerability has been discovered in the OpenJDK Java runtime, which may result in authorisation bypass or information disclosure. For the stable distribution (bookworm), this problem has been fixed in
Two security issues were discovered in Redis, a persistent key-value database, which could result in the execution of arbitrary code or denial of service.
Security issues were discovered in Chromium which could result in the execution of arbitrary code, denial of service, or information disclosure.
Several vulnerabilities were discovered in BIND, a DNS server implementation, which may result in denial of service. For the stable distribution (bookworm), these problems have been fixed in
Matthias Gerstner reported that pam-u2f, a PAM module which allows to use U2F (Universal 2nd Factor) devices in the PAM authentication stack, does not properly handle PAM_IGNORE return values, allowing to bypass the second factor or password-less login without inserting the proper
Toshifumi Sakaguchi discovered that too permissive parsing of some resource record sets in the zone file parsing of PDNS Recursor could result in denial of service.
Multiple vulnerabilities have been discovered in openjpeg2, the open-source JPEG 2000 codec, which could result in denial of service or the execution of arbitrary code if malformed images are opened.
Multiple issues were found in Git, a fast, scalable, distributed revision control system, which may result in leaking credential information to an unintended host.
It was discovered that Git LFS, a Git extension for versioning large files, could leak authentication credentials in some setups. For the stable distribution (bookworm), this problem has been fixed in
Security issues were discovered in Chromium which could result in the execution of arbitrary code, denial of service, or information disclosure.
It was discovered that the JSON RPC interface of the server componenent of Snapcast, a multi-room client-server audio player, allowed the execution of arbitrary code.