Debian 10826 Published by

Three critical security advisories were issued by the Debian Project to patch vulnerabilities in ansible, gst-plugins-base1.0, and nodejs. Attackers could exploit this ansible vulnerability by bypassing unsafe content protections using the hostvars object for arbitrary code execution. The remaining advisories resolve integer overflow bugs and file restriction bypasses that threaten stability or allow information disclosure. Users should upgrade their systems immediately because updated package versions are available for Debian GNU/Linux 11 (Bullseye) LTS, 12 (Bookworm), and 13 (Trixie) distributions.

[DLA 4502-1] ansible security update
[DSA 6167-1] gst-plugins-base1.0 security update
[DSA 6166-1] nodejs security update




[SECURITY] [DLA 4502-1] ansible security update


-------------------------------------------------------------------------
Debian LTS Advisory DLA-4502-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Lee Garrett
March 17, 2026 https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package : ansible
Version : 2.10.7+merged+base+2.10.17+dfsg-0+deb11u4
CVE ID : CVE-2024-11079
Debian Bug : 1088106

A flaw was found in ansible, a configuration management, deployment, and task
execution system. This vulnerability allows attackers to bypass unsafe content
protections using the hostvars object to reference and execute templated
content. This issue can lead to arbitrary code execution if remote data or
module outputs are improperly templated within playbooks.

For Debian 11 bullseye, this problem has been fixed in version
2.10.7+merged+base+2.10.17+dfsg-0+deb11u4.

We recommend that you upgrade your ansible packages.

For the detailed security status of ansible please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/ansible

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



[SECURITY] [DSA 6167-1] gst-plugins-base1.0 security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-6167-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
March 17, 2026 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : gst-plugins-base1.0
CVE ID : CVE-2026-2921

An integer overflow was discovered in the RIFF parser of the GStreamer
media framework, which may result in denial of service or potentially the
execution of arbitrary code if a malformed media file is opened.

For the oldstable distribution (bookworm), this problem has been fixed
in version 1.22.0-3+deb12u6.

For the stable distribution (trixie), this problem has been fixed in
version 1.26.2-1+deb13u1.

We recommend that you upgrade your gst-plugins-base1.0 packages.

For the detailed security status of gst-plugins-base1.0 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/gst-plugins-base1.0

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/


[SECURITY] [DSA 6166-1] nodejs security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-6166-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
March 17, 2026 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : nodejs
CVE ID : CVE-2025-23085 CVE-2025-55130 CVE-2025-55131 CVE-2025-55132
CVE-2025-59465 CVE-2025-59466 CVE-2026-21637

Multiple vulnerabilities were discovered in Node.js, which could result
in denial of service or information disclosure or bypass of file
restrictions.

For the stable distribution (trixie), these problems have been fixed in
version 20.19.2+dfsg-1+deb13u1.

We recommend that you upgrade your nodejs packages.

For the detailed security status of nodejs please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/nodejs

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/