------------------------------------------------------------------------ The Debian Project https://www.debian.org/ Updated Debian 12: 12.10 released press@debian.org March 15th, 2025 https://www.debian.org/News/2025/20250315 ------------------------------------------------------------------------ The Debian project is pleased to announce the tenth update of its stable distribution Debian 12 (codename "bookworm"). This point release mainly adds corrections for security issues, along with a few adjustments for serious problems. Security advisories have already been published separately and are referenced where available. Please note that the point release does not constitute a new version of Debian 12 but only updates some of the packages included. There is no need to throw away old "bookworm" media. After installation, packages can be upgraded to the current versions using an up-to-date Debian mirror. Those who frequently install updates from security.debian.org won't have to update many packages, and most such updates are included in the point release. New installation images will be available soon at the regular locations. Upgrading an existing installation to this revision can be achieved by pointing the package management system at one of Debian's many HTTP mirrors. A comprehensive list of mirrors is available at: https://www.debian.org/mirror/list Miscellaneous Bugfixes ---------------------- This stable update adds a few important corrections to the following packages: +-------------------------+-------------------------------------------+ | Package | Reason | +-------------------------+-------------------------------------------+ | 389-ds-base [1] | Fix crash when modifying userPassword | | | using malformed input [CVE-2024-2199 | | | CVE-2024-8445]; prevent denial of service | | | while attempting to log in with a user | | | with a malformed hash in their password | | | [CVE-2024-5953]; prevent denial of | | | service on the directory server with | | | specially-crafted LDAP query [CVE-2024- | | | 3657] | | | | | base-files [2] | Update for the point release | | | | | bup [3] | New upstream bugfix release | | | | | containerd [4] | Fix tests causing FTBFS on the auto- | | | builder network | | | | | curl [5] | Fix unintended HTTPS upgrades or | | | premature reversion to HTTP when both | | | subdomains and parent domains are used | | | [CVE-2024-9681]; prevent stopping of | | | stunnel before retries in the built-time | | | tests; fix possible credentials leakage | | | issues [CVE-2024-11053 CVE-2025-0167]; | | | fix test failures due to port clashes | | | | | dacite [6] | Do not cache result of | | | get_default_value_for_field | | | | | dcmtk [7] | Fix issue when rendering an invalid | | | monochrome DICOM image [CVE-2024-47796]; | | | ensure: HighBit < BitsAllocated | | | [CVE-2024-52333]; fix possible overflows | | | when allocating memory [CVE-2024-27628]; | | | fix two segmentation faults [CVE-2024- | | | 34508 CVE-2024-34509]; fix arbitrary code | | | execution issue [CVE-2024-28130]; fix | | | buffer overflow issues [CVE-2025-25472 | | | CVE-2025-25474]; fix NULL pointer | | | dereference issue [CVE-2025-25475] | | | | | debian-installer [8] | Increase Linux kernel ABI to 6.1.0-32; | | | rebuild against proposed-updates | | | | | debian-ports-archive- | Add 2026 key; move 2023 and 2024 keys to | | keyring [9] | the removed keyring | | | | | dgit [10] | Add missing parameters for source upload | | | target | | | | | djoser [11] | Fix authentication bypass [CVE-2024- | | | 21543] | | | | | dns-root-data [12] | Add the DNSKEY record for KSK-2024 | | | | | edk2 [13] | Fix overflow condition in | | | PeCoffLoaderRelocateImage() [CVE-2024- | | | 38796]; fix potential UINT32 overflow in | | | S3 ResumeCount [CVE-2024-1298] | | | | | elpa [14] | Fix tests on machines with 2 vCPU or | | | fewer | | | | | flightgear [15] | Fix sandbox bypass vulnerability in Nasal | | | scripts [CVE-2025-0781] | | | | | gensim [16] | Fix build failure on single-CPU machines | | | | | glibc [17] | Fix buffer overflow when printing | | | assertion failure message [CVE-2025- | | | 0395]; fix memset performance for | | | unaligned destinations; fix TLS | | | performance degradation after dlopen() | | | usage; avoid integer truncation when | | | parsing CPUID data with large cache | | | sizes; ensure data passed to the rseq | | | syscall are properly initialized | | | | | golang-github- | Disable a test known to fail on the auto- | | containers-buildah [18] | builder network, fixing build failure | | | | | intel-microcode [19] | New upstream security release [CVE-2023- | | | 34440 CVE-2023-43758 CVE-2024-24582 | | | CVE-2024-28047 CVE-2024-28127 CVE-2024- | | | 29214 CVE-2024-31068 CVE-2024-31157 | | | CVE-2024-36293 CVE-2024-37020 CVE-2024- | | | 39279 CVE-2024-39355] | | | | | iptables-netflow [20] | Fix build with newer bullseye kernels | | | | | jinja2 [21] | Fix arbitrary code execution issues | | | [CVE-2024-56201 CVE-2024-56326] | | | | | joblib [22] | Fix build failure on single-CPU systems | | | | | lemonldap-ng [23] | Fix CSRF vulnerability on 2FA | | | registration interface [CVE-2024-52948] | | | | | libapache-mod-jk [24] | Set correct default permissions for | | | shared memory [CVE-2024-46544] | | | | | libeconf [25] | Fix buffer overflow vulnerability | | | [CVE-2023-32181 CVE-2023-22652] | | | | | librabbitmq [26] | Add option to read username/password from | | | file [CVE-2023-35789] | | | | | libtar [27] | Fix out-of-bounds read in gnu_longlink() | | | [CVE-2021-33643]; fix out-of-bounds read | | | in gnu_longname() [CVE-2021-33644]; fix | | | memory leak in th_read() [CVE-2021- | | | 33645]; fix memory leak in th_read() | | | [CVE-2021-33646] | | | | | linux [28] | New upstream release; bump ABI to 32 | | | | | linux-signed-amd64 [29] | New upstream release; bump ABI to 32 | | | | | linux-signed-arm64 [30] | New upstream release; bump ABI to 32 | | | | | linux-signed-i386 [31] | New upstream release; bump ABI to 32 | | | | | linuxcnc [32] | Fix multi axes movement on single axis G0 | | | MDI call | | | | | ltt-control [33] | Fix consumer crash on shutdown | | | | | lttng-modules [34] | Fix build with newer bullseye kernels | | | | | mariadb [35] | New upstream stable release; fix security | | | issue [CVE-2024-21096]; fix denial of | | | service issue [CVE-2025-21490] | | | | | monero [36] | Impose response limits on HTTP server | | | connections [CVE-2025-26819] | | | | | mozc [37] | Install fcitx icons to the correct | | | locations | | | | | ndcube [38] | Ignore test warnings from astropy | | | | | nginx [39] | Fix possible bypass of client certificate | | | authentication [CVE-2025-23419] | | | | | node-axios [40] | Fix CSRF vulnerability [CVE-2023-45857]; | | | fix potential vulnerability in URL when | | | determining an origin [CVE-2024-57965] | | | | | node-js-sdsl [41] | Fix build failure | | | | | node-postcss [42] | Fix mishandling of non-integer values | | | leading to denial of service in nanoid | | | [CVE-2024-55565]; fix parsing of external | | | untrusted CSS [CVE-2023-44270] | | | | | node-recast [43] | Fix build failure | | | | | node-redis [44] | Fix build failure | | | | | node-rollup [45] | Fix build failure arising from changed | | | timeout API | | | | | openh264 [46] | Fix Cisco download URL | | | | | php-nesbot-carbon [47] | Fix arbitrary file include issue | | | [CVE-2025-22145] | | | | | postgresql-15 [48] | New upstream stable release; harden | | | PQescapeString and allied functions | | | against invalidly-encoded strings; | | | improve behavior of libpq's quoting | | | functions [CVE-2025-1094] | | | | | puma [49] | Fix behavior when parsing chunked | | | transfer encoding bodies and zero-length | | | Content-Length headers [CVE-2023-40175]; | | | limit size of chunk extensions [CVE-2024- | | | 21647]; prevent manipulation of headers | | | set by intermediate proxies [CVE-2024- | | | 45614] | | | | | python-django [50] | Fix regular expression-based denial of | | | service issue [CVE-2023-36053], denial of | | | service issues [CVE-2024-38875 CVE-2024- | | | 39614 CVE-2024-41990 CVE-2024-41991], | | | user enumeration issue [CVE-2024-39329], | | | directory traversal issue [CVE-2024- | | | 39330], excessive memory consumption | | | issue [CVE-2024-41989], SQL injection | | | issue [CVE-2024-42005] | | | | | python-pycdlib [51] | Run tests only if /tmp is tmpfs, | | | otherwise they are known to fail | | | | | rapiddisk [52] | Support Linux versions up to 6.10 | | | | | rsyslog [53] | Avoid segmentation fault if a SIGTERM is | | | received during startup | | | | | runit-services [54] | Do not enable dhclient service by default | | | | | seqan3 [55] | Fix parallel running of tests | | | | | simgear [56] | Fix sandbox bypass vulnerability in Nasal | | | scripts [CVE-2025-0781] | | | | | spamassassin [57] | New upstream stable release | | | | | sssd [58] | Apply GPO policy consistently [CVE-2023- | | | 3758] | | | | | subversion [59] | Fix vulnerable parsing of control | | | characters in paths served by mod_dav_svn | | | [CVE-2024-46901] | | | | | sunpy [60] | Ignore test warnings from astropy | | | | | systemd [61] | New upstream stable release | | | | | tzdata [62] | New upstream release; update data for | | | Paraguay; update leap second information | | | | | vagrant [63] | Fix URL of public Vagrant registry | | | | | vim [64] | Fix crash when expanding "~" in | | | substitute [CVE-2023-2610]; fix buffer- | | | overflow in vim_regsub_both() [CVE-2023- | | | 4738]; fix heap use after free in | | | ins_compl_get_exp() [CVE-2023-4752]; fix | | | heap-buffer-overflow in vim_regsub_both | | | [CVE-2023-4781]; fix buffer-overflow in | | | trunc_string() [CVE-2023-5344]; fix | | | stack-buffer-overflow in option callback | | | functions [CVE-2024-22667]; fix heap- | | | buffer-overflow in ins_typebuf (CVE-2024- | | | 43802]; fix use-after-free when closing a | | | buffer [CVE-2024-47814]; fix build | | | failure on 32-bit architectures | | | | | wget [65] | Fix mishandling of semicolons in userinfo | | | in URLs [CVE-2024-38428] | | | | | xen [66] | Allow direct kernel boot with kernels >= | | | 6.12 | | | | +-------------------------+-------------------------------------------+ 1: https://packages.debian.org/src:389-ds-base 2: https://packages.debian.org/src:base-files 3: https://packages.debian.org/src:bup 4: https://packages.debian.org/src:containerd 5: https://packages.debian.org/src:curl 6: https://packages.debian.org/src:dacite 7: https://packages.debian.org/src:dcmtk 8: https://packages.debian.org/src:debian-installer 9: https://packages.debian.org/src:debian-ports-archive-keyring 10: https://packages.debian.org/src:dgit 11: https://packages.debian.org/src:djoser 12: https://packages.debian.org/src:dns-root-data 13: https://packages.debian.org/src:edk2 14: https://packages.debian.org/src:elpa 15: https://packages.debian.org/src:flightgear 16: https://packages.debian.org/src:gensim 17: https://packages.debian.org/src:glibc 18: https://packages.debian.org/src:golang-github-containers-buildah 19: https://packages.debian.org/src:intel-microcode 20: https://packages.debian.org/src:iptables-netflow 21: https://packages.debian.org/src:jinja2 22: https://packages.debian.org/src:joblib 23: https://packages.debian.org/src:lemonldap-ng 24: https://packages.debian.org/src:libapache-mod-jk 25: https://packages.debian.org/src:libeconf 26: https://packages.debian.org/src:librabbitmq 27: https://packages.debian.org/src:libtar 28: https://packages.debian.org/src:linux 29: https://packages.debian.org/src:linux-signed-amd64 30: https://packages.debian.org/src:linux-signed-arm64 31: https://packages.debian.org/src:linux-signed-i386 32: https://packages.debian.org/src:linuxcnc 33: https://packages.debian.org/src:ltt-control 34: https://packages.debian.org/src:lttng-modules 35: https://packages.debian.org/src:mariadb 36: https://packages.debian.org/src:monero 37: https://packages.debian.org/src:mozc 38: https://packages.debian.org/src:ndcube 39: https://packages.debian.org/src:nginx 40: https://packages.debian.org/src:node-axios 41: https://packages.debian.org/src:node-js-sdsl 42: https://packages.debian.org/src:node-postcss 43: https://packages.debian.org/src:node-recast 44: https://packages.debian.org/src:node-redis 45: https://packages.debian.org/src:node-rollup 46: https://packages.debian.org/src:openh264 47: https://packages.debian.org/src:php-nesbot-carbon 48: https://packages.debian.org/src:postgresql-15 49: https://packages.debian.org/src:puma 50: https://packages.debian.org/src:python-django 51: https://packages.debian.org/src:python-pycdlib 52: https://packages.debian.org/src:rapiddisk 53: https://packages.debian.org/src:rsyslog 54: https://packages.debian.org/src:runit-services 55: https://packages.debian.org/src:seqan3 56: https://packages.debian.org/src:simgear 57: https://packages.debian.org/src:spamassassin 58: https://packages.debian.org/src:sssd 59: https://packages.debian.org/src:subversion 60: https://packages.debian.org/src:sunpy 61: https://packages.debian.org/src:systemd 62: https://packages.debian.org/src:tzdata 63: https://packages.debian.org/src:vagrant 64: https://packages.debian.org/src:vim 65: https://packages.debian.org/src:wget 66: https://packages.debian.org/src:xen Security Updates ---------------- This revision adds the following security updates to the stable release. The Security Team has already released an advisory for each of these updates: +----------------+--------------------------+ | Advisory ID | Package | +----------------+--------------------------+ | DSA-5834 [67] | chromium [68] | | | | | DSA-5836 [69] | xen [70] | | | | | DSA-5839 [71] | firefox-esr [72] | | | | | DSA-5840 [73] | chromium [74] | | | | | DSA-5841 [75] | thunderbird [76] | | | | | DSA-5842 [77] | openafs [78] | | | | | DSA-5843 [79] | rsync [80] | | | | | DSA-5844 [81] | chromium [82] | | | | | DSA-5845 [83] | tomcat10 [84] | | | | | DSA-5846 [85] | libreoffice [86] | | | | | DSA-5847 [87] | snapcast [88] | | | | | DSA-5848 [89] | chromium [90] | | | | | DSA-5849 [91] | git-lfs [92] | | | | | DSA-5850 [93] | git [94] | | | | | DSA-5851 [95] | openjpeg2 [96] | | | | | DSA-5852 [97] | pdns-recursor [98] | | | | | DSA-5853 [99] | pam-u2f [100] | | | | | DSA-5854 [101] | bind9 [102] | | | | | DSA-5855 [103] | chromium [104] | | | | | DSA-5856 [105] | redis [106] | | | | | DSA-5857 [107] | openjdk-17 [108] | | | | | DSA-5858 [109] | firefox-esr [110] | | | | | DSA-5859 [111] | chromium [112] | | | | | DSA-5860 [113] | linux-signed-amd64 [114] | | | | | DSA-5860 [115] | linux-signed-arm64 [116] | | | | | DSA-5860 [117] | linux-signed-i386 [118] | | | | | DSA-5860 [119] | linux [120] | | | | | DSA-5861 [121] | thunderbird [122] | | | | | DSA-5862 [123] | cacti [124] | | | | | DSA-5863 [125] | libtasn1-6 [126] | | | | | DSA-5864 [127] | pam-pkcs11 [128] | | | | | DSA-5865 [129] | webkit2gtk [130] | | | | | DSA-5866 [131] | chromium [132] | | | | | DSA-5867 [133] | gnutls28 [134] | | | | | DSA-5868 [135] | openssh [136] | | | | | DSA-5869 [137] | chromium [138] | | | | | DSA-5870 [139] | openh264 [140] | | | | | DSA-5871 [141] | emacs [142] | | | | | DSA-5872 [143] | xorg-server [144] | | | | | DSA-5873 [145] | libreoffice [146] | | | | | DSA-5874 [147] | firefox-esr [148] | | | | | DSA-5875 [149] | chromium [150] | | | | | DSA-5876 [151] | thunderbird [152] | | | | +----------------+--------------------------+ 67: https://www.debian.org/security/2024/dsa-5834 68: https://packages.debian.org/src:chromium 69: https://www.debian.org/security/2024/dsa-5836 70: https://packages.debian.org/src:xen 71: https://www.debian.org/security/2025/dsa-5839 72: https://packages.debian.org/src:firefox-esr 73: https://www.debian.org/security/2025/dsa-5840 74: https://packages.debian.org/src:chromium 75: https://www.debian.org/security/2025/dsa-5841 76: https://packages.debian.org/src:thunderbird 77: https://www.debian.org/security/2025/dsa-5842 78: https://packages.debian.org/src:openafs 79: https://www.debian.org/security/2025/dsa-5843 80: https://packages.debian.org/src:rsync 81: https://www.debian.org/security/2025/dsa-5844 82: https://packages.debian.org/src:chromium 83: https://www.debian.org/security/2025/dsa-5845 84: https://packages.debian.org/src:tomcat10 85: https://www.debian.org/security/2025/dsa-5846 86: https://packages.debian.org/src:libreoffice 87: https://www.debian.org/security/2025/dsa-5847 88: https://packages.debian.org/src:snapcast 89: https://www.debian.org/security/2025/dsa-5848 90: https://packages.debian.org/src:chromium 91: https://www.debian.org/security/2025/dsa-5849 92: https://packages.debian.org/src:git-lfs 93: https://www.debian.org/security/2025/dsa-5850 94: https://packages.debian.org/src:git 95: https://www.debian.org/security/2025/dsa-5851 96: https://packages.debian.org/src:openjpeg2 97: https://www.debian.org/security/2025/dsa-5852 98: https://packages.debian.org/src:pdns-recursor 99: https://www.debian.org/security/2025/dsa-5853 100: https://packages.debian.org/src:pam-u2f 101: https://www.debian.org/security/2025/dsa-5854 102: https://packages.debian.org/src:bind9 103: https://www.debian.org/security/2025/dsa-5855 104: https://packages.debian.org/src:chromium 105: https://www.debian.org/security/2025/dsa-5856 106: https://packages.debian.org/src:redis 107: https://www.debian.org/security/2025/dsa-5857 108: https://packages.debian.org/src:openjdk-17 109: https://www.debian.org/security/2025/dsa-5858 110: https://packages.debian.org/src:firefox-esr 111: https://www.debian.org/security/2025/dsa-5859 112: https://packages.debian.org/src:chromium 113: https://www.debian.org/security/2025/dsa-5860 114: https://packages.debian.org/src:linux-signed-amd64 115: https://www.debian.org/security/2025/dsa-5860 116: https://packages.debian.org/src:linux-signed-arm64 117: https://www.debian.org/security/2025/dsa-5860 118: https://packages.debian.org/src:linux-signed-i386 119: https://www.debian.org/security/2025/dsa-5860 120: https://packages.debian.org/src:linux 121: https://www.debian.org/security/2025/dsa-5861 122: https://packages.debian.org/src:thunderbird 123: https://www.debian.org/security/2025/dsa-5862 124: https://packages.debian.org/src:cacti 125: https://www.debian.org/security/2025/dsa-5863 126: https://packages.debian.org/src:libtasn1-6 127: https://www.debian.org/security/2025/dsa-5864 128: https://packages.debian.org/src:pam-pkcs11 129: https://www.debian.org/security/2025/dsa-5865 130: https://packages.debian.org/src:webkit2gtk 131: https://www.debian.org/security/2025/dsa-5866 132: https://packages.debian.org/src:chromium 133: https://www.debian.org/security/2025/dsa-5867 134: https://packages.debian.org/src:gnutls28 135: https://www.debian.org/security/2025/dsa-5868 136: https://packages.debian.org/src:openssh 137: https://www.debian.org/security/2025/dsa-5869 138: https://packages.debian.org/src:chromium 139: https://www.debian.org/security/2025/dsa-5870 140: https://packages.debian.org/src:openh264 141: https://www.debian.org/security/2025/dsa-5871 142: https://packages.debian.org/src:emacs 143: https://www.debian.org/security/2025/dsa-5872 144: https://packages.debian.org/src:xorg-server 145: https://www.debian.org/security/2025/dsa-5873 146: https://packages.debian.org/src:libreoffice 147: https://www.debian.org/security/2025/dsa-5874 148: https://packages.debian.org/src:firefox-esr 149: https://www.debian.org/security/2025/dsa-5875 150: https://packages.debian.org/src:chromium 151: https://www.debian.org/security/2025/dsa-5876 152: https://packages.debian.org/src:thunderbird Removed packages ---------------- The following packages were removed due to circumstances beyond our control: +---------------------------+----------------------------------------+ | Package | Reason | +---------------------------+----------------------------------------+ | kanboard [153] | Unmaintained; security issues | | | | | libnet-easytcp-perl [154] | Unmaintained upstream; security issues | | | | | looking-glass [155] | Not suitable for a stable release | | | | +---------------------------+----------------------------------------+ 153: https://packages.debian.org/src:kanboard 154: https://packages.debian.org/src:libnet-easytcp-perl 155: https://packages.debian.org/src:looking-glass Debian Installer ---------------- The installer has been updated to include the fixes incorporated into stable by the point release. URLs ---- The complete lists of packages that have changed with this revision: https://deb.debian.org/debian/dists/bookworm/ChangeLog The current stable distribution: https://deb.debian.org/debian/dists/stable/ Proposed updates to the stable distribution: https://deb.debian.org/debian/dists/proposed-updates stable distribution information (release notes, errata etc.): https://www.debian.org/releases/stable/ Security announcements and information: https://www.debian.org/security/ About Debian ------------ The Debian Project is an association of Free Software developers who volunteer their time and effort in order to produce the completely free operating system Debian. Contact Information ------------------- For further information, please visit the Debian web pages at https://www.debian.org/, send mail to <press@debian.org>, or contact the stable release team at <debian-release@lists.debian.org>.
Attachment:
signature.asc
Description: This is a digitally signed message part