Debian 10851 Published by Philipp Esselbach 0

Debian released two security advisories regarding vulnerabilities found in webkit2gtk and freeciv packages. The web engine update corrects eight flaws including unexpected crashes and a privacy issue where extensions could track users. A separate advisory addresses a packet processing error in the free strategy game server that could allow attackers to cause denial of service.

[DSA 6172-1] webkit2gtk security update
[DSA 6173-1] freeciv security update

Debian 10851 Published by Philipp Esselbach 0

Three Debian security advisories were released regarding critical package vulnerabilities. Libvirt users running bullseye must upgrade because a recent Linux update caused valid netlink flags to be rejected incorrectly. Chromium requires immediate attention for both oldstable and stable systems since the discovered flaws enable attackers to execute arbitrary code or cause denial of service attacks on affected machines. Finally, imagemagick users on stretch need patches for over twenty flaws including potential security policy bypasses and information leaks.

Debian GNU/Linux 9 (Stretch) Extended LTS:
ELA-1659-1 imagemagick security update

Debian GNU/Linux 11 (Bullseye) LTS:
[DLA 4504-1] libvirt security update

Debian GNU/Linux 12 (Bookworm) and 13 (Trixie):
[DSA 6171-1] chromium security update

Debian 10851 Ubuntu 7041 Published by Philipp Esselbach 0

The XanMod team has pushed out kernel versions 6.19.9 and 6.18.19 LTS for users who want to squeeze extra performance out of their Linux desktops without waiting for standard cycles. These builds ship with Google's BBRv3 congestion control enabled by default alongside specific tweaks for AMD 3D V-Cache processors that most distros ignore. Installation requires adding a new repository key and ensuring DKMS dependencies are present before attempting an update on Debian or Ubuntu systems. Anyone running NVIDIA drivers or VM software should proceed with caution because third-party modules often break until their maintainers catch up to the latest changes.

Debian 10851 Published by Philipp Esselbach 0

A batch of security updates for Debian has been released addressing vulnerabilities found in the OpenSSL toolkit used for secure communication over the Internet. Researchers identified multiple critical flaws in ImageMagick ranging from symlink races to potential arbitrary code execution within the graphics processing software. Administrators must prioritize upgrading snapd immediately since a local privilege escalation vulnerability allows attackers to gain unauthorized access without detection on the host system. Finally, a patch fixes evolution-data-server so Flatpak apps cannot delete arbitrary host files using D-Bus access.

Debian GNU/Linux 9 (Stretch) and 10 (Buster) ELTS:
ELA-1658-1 openssl security update

Debian GNU/Linux 11 (Bullseye) LTS:
[DLA 4503-1] evolution-data-server security update

Debian GNU/Linux 12 (Bookworm) and 13 (Trixie):
[DSA 6170-1] snapd security update

Debian GNU/Linux 13 (Trixie):
[DSA 6169-1] imagemagick security update

Debian 10851 Published by Philipp Esselbach 0

Debian released a security advisory regarding an integer overflow vulnerability found within the freetype font engine software. Attackers could exploit this flaw to access sensitive information or cause denial of service conditions on vulnerable systems. Administrators running the stable Debian 13 trixie distribution must upgrade their packages to version 2.13.3+dfsg-1+deb13u1 to resolve the issue immediately.

[DSA 6168-1] freetype security update

Debian 10851 Published by Philipp Esselbach 0

Three critical security advisories were issued by the Debian Project to patch vulnerabilities in ansible, gst-plugins-base1.0, and nodejs. Attackers could exploit this ansible vulnerability by bypassing unsafe content protections using the hostvars object for arbitrary code execution. The remaining advisories resolve integer overflow bugs and file restriction bypasses that threaten stability or allow information disclosure. Users should upgrade their systems immediately because updated package versions are available for Debian GNU/Linux 11 (Bullseye) LTS, 12 (Bookworm), and 13 (Trixie) distributions.

[DLA 4502-1] ansible security update
[DSA 6167-1] gst-plugins-base1.0 security update
[DSA 6166-1] nodejs security update

Debian 10851 Published by Philipp Esselbach 0

A security update has arrived for imagemagick on Debian GNU/Linux 10 (Buster) Extended LTS systems to address critical flaws. This software edits digital images but contains multiple security holes that require immediate attention from administrators. Exploiting these vulnerabilities could lead to arbitrary code execution or information leaks for vulnerable users running older versions.

ELA-1657-1 imagemagick security update

Debian 10851 Published by Philipp Esselbach 0

Debian issued a security bulletin highlighting serious risks within the Chromium browser software. Exploits for these issues are already active in the wild so users must act quickly. Updated packages addressing CVE-2026-3909 and CVE-2026-3910 have been released for both the bookworm and trixie distributions to resolve the security issues.

[DSA 6165-1] chromium security update

Debian 10851 Published by Philipp Esselbach 0

Users looking to test new software can try the Debian GNU/Linux 13.4 Trixie Live Images without risking their main drive during the process. This release integrates fresh tools across several desktop environments like GNOME, KDE Plasma, and Xfce that promise improved performance for daily tasks. You must configure persistent storage explicitly because files disappear once you shut down the session otherwise. Whether you prefer a lightweight setup with LXDE or a feature-rich interface like Cinnamon, these live images provide a versatile foundation for exploring the latest Linux features safely.

Debian 10851 Ubuntu 7041 Published by Philipp Esselbach 0

XanMod has released new kernel versions 6.19.8 and 6.18.18 LTS tailored for Debian-based distributions that need a performance boost over stock builds. These custom kernels feature advanced optimizations like LLVM ThinLTO and Google's BBRv3 TCP congestion control to handle heavy workloads with greater efficiency. While installation is straightforward via APT, users should expect potential DKMS breakages with proprietary drivers like NVIDIA or VirtualBox before rebooting the system. It remains a viable option for enthusiasts willing to troubleshoot module compatibility in exchange for smoother multitasking and improved network throughput.

Debian 10851 Published by Philipp Esselbach 0

Debian has released security updates for the GIMP image editing software and the wireless-regdb package. The GIMP update addresses several vulnerabilities that could lead to denial of service or arbitrary code execution if malicious XWD, ICNS, PGM, or ICO files are opened in Debian GNU/Linux 9 (Stretch) ELTS, 10 (Buster) ELTS, and 11 (Bullseye) LTS. A separate update is available for Debian GNU/Linux 11 (Bullseye) LTS, which includes changes to radio regulations in various countries and is available as version 2026.02.04-1~deb11u1

ELA-1656-1 gimp security update
[DLA 4500-1] gimp security updat
[DLA 4501-1] wireless-regdb new upstream version

Debian 10851 Ubuntu 7041 Arch Linux 949 Published by Philipp Esselbach 0

The Liquorix Kernel 6.19-3 release based on Linux Kernel 6.19.8 targets enthusiasts who demand uncompromised responsiveness for interactive systems and low latency compute. It implements major performance tuning changes including Zen Interactive Tuning and optimized disk I/O schedulers to reduce frame time deviations in gaming and A/V production workflows. Users on Debian, Ubuntu, or Arch Linux can install this kernel variant easily through a one-line script that automatically configures dependencies without manual intervention. This update prioritizes system reaction times over maximum throughput or power usage by enabling hard kernel preemption and aggressive CPUFreq optimizations for responsive task scheduling.

Debian 10851 Published by Philipp Esselbach 0

Debian GNU/Linux 13.4 is the fourth point release of the stable trixie distribution designed to address security issues and package corrections rather than introducing new features. This update resolves multiple critical vulnerabilities including CVE issues in packages like openssl, linux, and apache2 while updating glibc to handle heap corruption and memory leaks. Administrators can upgrade existing installations via HTTP mirrors or security.debian.org without discarding old media because most updates are bundled within this revision. New installation images and an updated Debian installer will be available soon to incorporate the necessary fixes for the stable distribution.

Debian 10851 Published by Philipp Esselbach 0

The Debian LTS team has released security updates for the Linux kernel in Debian GNU/Linux 11 (Bullseye) LTS to address several vulnerabilities. These issues may lead to privilege escalation, denial of service, or information leaks. Two separate updates are available: DLA-4499-1 for version 6.1 and DLA-4498-1 for version 5.10. The updates fix multiple CVEs including CVE-2023-53424, CVE-2024-26822, and others, as well as a regression in the previous update.

[DLA 4499-1] linux-6.1 security update
[DLA 4498-1] linux security update

Debian 10851 Published by Philipp Esselbach 0

Debian has released several security advisories to address vulnerabilities in various packages. These advisories include DSA-6164-1, which updates the chromium package to fix multiple security issues that could lead to code execution or information disclosure. The update is available for Debian GNU/Linux 12 (Bookworm) and 13 (Trixie). In addition to the chromium advisory, there are also three other advisories: DSA-6162-1, which updates the linux package to address multiple vulnerabilities in the Linux kernel; DSA-6163-1, another update to the linux package that fixes several more vulnerabilities; and DSA-6161-1, which updates the multipart package to fix a vulnerability that could lead to a denial of service.

[DSA 6164-1] chromium security update
[DSA 6162-1] linux security update
[DSA 6163-1] linux security update
[DSA 6161-1] multipart security update

Debian 10851 Ubuntu 7041 Published by Philipp Esselbach 0

XanMod has released kernel versions 6.19.7 and 6.18.17, built with LLVM ThinLTO and enhanced scheduling that can lower CPU usage and improve latency for heavy workloads. Installing the kernel is as easy as adding a signed repository line to APT, updating the package list, and running sudo apt install linux-xanmod-x64v3. Users with NVIDIA, OpenZFS, VirtualBox, or VMware modules should verify driver compatibility first, since some proprietary modules lag behind the new thinlto patches and can cause panics. For those who need guaranteed support for cutting‑edge hardware or legacy systems, the distribution’s stock kernel remains a reliable fallback.

Debian 10851 Published by Philipp Esselbach 0

Debian has published two Debian Security Advisories, one for netty for both Debian 12/13 and another for imagemagick for Debian 11 LTS. A series of security updates are announced with this advisory which includes patches for multiple CVEs (Common Vulnerabilities and Exposures) across different distributions. The netty update addresses vulnerabilities that allow denial-of-service attacks, request smuggling, SMTP command injection, and allocation of resources without limits or throttling.

[DSA 6160-1] netty security update
[DLA 4497-1] imagemagick security update

Debian 10851 Published by Philipp Esselbach 0

A security update has been released for the imagemagick package in Debian, a software suite used to edit and manipulate digital images. Multiple vulnerabilities were discovered that could lead to information leaks, denial of service, or arbitrary code execution. The stable distribution (trixie) has been fixed with version 8:7.1.1.43+dfsg1-1+deb13u6, and it's recommended to upgrade imagemagick packages to fix these issues.

[DSA 6158-1] imagemagick security update

Debian 10851 Published by Philipp Esselbach 0

Several vulnerabilities have been discovered in OpenJDK Java runtime for Debian GNU/Linux 9 (Stretch) Extended LTS, which may lead to issues such as incorrect certificate validation and man-in-the-middle attacks. Additionally, a chromium security update has been released for both Debian GNU/Linux 12 (Bookworm) and 13 (Trixie) due to several security issues discovered in Chromium, including the potential execution of arbitrary code and information disclosure.

ELA-1655-1 openjdk-8 security update
[DSA 6157-1] chromium security update