Debian 10856 Published by

Debian released security patches for PostgreSQL to fix four vulnerabilities involving memory disclosure and arbitrary code execution risks within the database engine. A separate advisory targets an OpenSSH GSSAPI Key Exchange flaw that enables remote code execution or denial of service if the setting remains active. Administrators should also upgrade libyaml-syck-perl because the package contains high-severity heap buffer overflows and memory corruption bugs discovered within its YAML emitter functions. Finally, BIND9 users need to apply patches for cache poisoning vulnerabilities that might let attackers inject forged data into name server caches on older distributions like buster.

Debian GNU/Linux 10 (Buster) ELTS:
ELA-1678-1 bind9 security update

Debian GNU/Linux 11 (Bullseye) LTS:
[DLA 4524-1] postgresql-13 security update
[DLA 4525-1] libyaml-syck-perl security update

Debian GNU/Linux 12 (Bookworm) and 13 (Trixie):
[DSA 6204-1] openssh security update




[SECURITY] [DLA 4524-1] postgresql-13 security update


-------------------------------------------------------------------------
Debian LTS Advisory DLA-4524-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Jochen Sprickerhof
April 08, 2026 https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package : postgresql-13
Version : 13.23-0+deb11u2
CVE ID : CVE-2026-2003 CVE-2026-2004 CVE-2026-2005 CVE-2026-2006
Debian Bug :

Multiple vulnerabilities were fixed in PostgreSQL, a popular database.

CVE-2026-2003

Fix CVE-2026-2003: Improper validation of type "oidvector" in PostgreSQL
allows a database user to disclose a few bytes of server memory. We have
not ruled out viability of attacks that arrange for presence of
confidential information in disclosed bytes, but they seem unlikely.

CVE-2026-2004

Fix CVE-2026-2004: Missing validation of type of input in PostgreSQL
intarray extension selectivity estimator function allows an object creator
to execute arbitrary code as the operating system user running the
database.

CVE-2026-2005

Fix CVE-2026-2005: Heap buffer overflow in PostgreSQL pgcrypto allows a
ciphertext provider to execute arbitrary code as the operating system user
running the database.

CVE-2026-2006

Fix CVE-2026-2006: Missing validation of multibyte character length in
PostgreSQL text manipulation allows a database user to issue crafted
queries that achieve a buffer overrun. That suffices to execute arbitrary
code as the operating system user running the database.

For Debian 11 bullseye, these problems have been fixed in version
13.23-0+deb11u2.

We recommend that you upgrade your postgresql-13 packages.

For the detailed security status of postgresql-13 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/postgresql-13

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



[SECURITY] [DSA 6204-1] openssh security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-6204-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
April 09, 2026 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : openssh
CVE ID : CVE-2026-3497
Debian Bug : 1130595

Jeremy Brown discovered a flaw in the GSSAPI Key Exchange patch applied
in Debian to OpenSSH, an implementation of the SSH protocol suite,
affecting non-default configurations with the GSSAPIKeyExchange setting
enabled. A remote attacker can take advantage of this flaw to cause a
denial of service, or potentially the execution of arbitrary code.

For the oldstable distribution (bookworm), this problem has been fixed
in version 1:9.2p1-2+deb12u9. This update includes fixes for
CVE-2025-61984 and CVE-2025-61985 which were queued for the Debian
bookworm 12.14 point release.

For the stable distribution (trixie), this problem has been fixed in
version 1:10.0p1-7+deb13u2.

We recommend that you upgrade your openssh packages.

For the detailed security status of openssh please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/openssh

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/


[SECURITY] [DLA 4525-1] libyaml-syck-perl security update


- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4525-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Andrej Shadura
April 09, 2026 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : libyaml-syck-perl
Version : 1.34-1+deb11u1
CVE ID : CVE-2025-11683 CVE-2026-4177

Brief introduction

CVE-2025-11683

Missing null terminators in token.c leads to but-of-bounds read
which allows adjacent variable to be read. The issue is seen with
complex YAML files with a hash of all keys and empty values.

CVE-2026-4177

Several security vulnerabilities including a high-severity heap
buffer overflow in the YAML emitter. The heap overflow occurs when
class names exceed the initial 512-byte allocation. The base64
decoder could read past the buffer end on trailing newlines. strtok
mutated n->type_id in place, corrupting shared node data. A memory
leak occurred in syck_hdlr_add_anchor when a node already had an
anchor. The incoming anchor string 'a' was leaked on early return.

For Debian 11 bullseye, these problems have been fixed in version
1.34-1+deb11u1.

We recommend that you upgrade your libyaml-syck-perl packages.

For the detailed security status of libyaml-syck-perl please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libyaml-syck-perl

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



ELA-1678-1 bind9 security update


Package : bind9
Version : 1:9.11.37+git20260204.fcafb2d+dfsg-0~deb10u1 (buster)

Related CVEs :
CVE-2025-40778

bind9 a popular name server was affected by a vulnerability.
Under certain circumstances, BIND is too lenient when accepting records from answers,
allowing an attacker to inject forged data into the cache (cache poisoning).
Security fixes needed to update isc-dhcp and bind-dyndb-ldap packages.


ELA-1678-1 bind9 security update