[DLA 4502-1] ansible security update
[DSA 6167-1] gst-plugins-base1.0 security update
[DSA 6166-1] nodejs security update
[SECURITY] [DLA 4502-1] ansible security update
-------------------------------------------------------------------------
Debian LTS Advisory DLA-4502-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Lee Garrett
March 17, 2026 https://wiki.debian.org/LTS
-------------------------------------------------------------------------
Package : ansible
Version : 2.10.7+merged+base+2.10.17+dfsg-0+deb11u4
CVE ID : CVE-2024-11079
Debian Bug : 1088106
A flaw was found in ansible, a configuration management, deployment, and task
execution system. This vulnerability allows attackers to bypass unsafe content
protections using the hostvars object to reference and execute templated
content. This issue can lead to arbitrary code execution if remote data or
module outputs are improperly templated within playbooks.
For Debian 11 bullseye, this problem has been fixed in version
2.10.7+merged+base+2.10.17+dfsg-0+deb11u4.
We recommend that you upgrade your ansible packages.
For the detailed security status of ansible please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/ansible
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
[SECURITY] [DSA 6167-1] gst-plugins-base1.0 security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-6167-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
March 17, 2026 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : gst-plugins-base1.0
CVE ID : CVE-2026-2921
An integer overflow was discovered in the RIFF parser of the GStreamer
media framework, which may result in denial of service or potentially the
execution of arbitrary code if a malformed media file is opened.
For the oldstable distribution (bookworm), this problem has been fixed
in version 1.22.0-3+deb12u6.
For the stable distribution (trixie), this problem has been fixed in
version 1.26.2-1+deb13u1.
We recommend that you upgrade your gst-plugins-base1.0 packages.
For the detailed security status of gst-plugins-base1.0 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/gst-plugins-base1.0
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
[SECURITY] [DSA 6166-1] nodejs security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-6166-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
March 17, 2026 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : nodejs
CVE ID : CVE-2025-23085 CVE-2025-55130 CVE-2025-55131 CVE-2025-55132
CVE-2025-59465 CVE-2025-59466 CVE-2026-21637
Multiple vulnerabilities were discovered in Node.js, which could result
in denial of service or information disclosure or bypass of file
restrictions.
For the stable distribution (trixie), these problems have been fixed in
version 20.19.2+dfsg-1+deb13u1.
We recommend that you upgrade your nodejs packages.
For the detailed security status of nodejs please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/nodejs
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/