Debian 10478 Published by

The Debian project has announced the release of the eleventh update to its stable distribution, Debian 12 (codename Bookworm). This point release primarily focuses on correcting security issues and making adjustments for critical problems. The update does not represent a new version of Debian 12; it merely updates certain packages included within it. Individuals who regularly install updates from security.debian.org will find that they do not need to update a significant number of packages, as the majority are incorporated in the point release. New installation images will be accessible shortly at the usual locations. To upgrade an existing installation to this revision, direct the package management system to one of Debian's HTTP mirrors.

There are identified issues with Linux version 6.1.137-1, specifically regarding the inability to load the watchdog and w83977f_wdt modules on the amd64 architecture. Individuals utilizing the watchdog functionality are advised to disable it or refrain from upgrading until a resolution is provided. Additional significant bug fixes encompass addressing heap overflows, ensuring compatibility with SWIG 4.1, and resolving memory leaks in libbson-xs-perl.





The release resolved a range of security vulnerabilities, encompassing build failures, cross-site scripting, and various packages including nvidia-graphics-drivers, nvidia-open-gpu-kernel-modules, nvidia-settings, openrazer, opensnitch, openssh, openssl, openvpn, phpmyadmin, policyd-rate-limit, poppler, postgresql-15, prometheus, python-h11, python3.11, qemu, qtbase-opensource-src, redis, renaissance, skeema, telegram-desktop, tripwire, Twitter-bootstrap3, tzdata, user-mode-linux, varnish, wireless-regdb, xmedcon, and zsh. 

Updated Debian 12: 12.11 released

The Debian project is pleased to announce the eleventh update of its stable distribution Debian 12 (codename bookworm). This point release mainly adds corrections for security issues, along with a few adjustments for serious problems. Security advisories have already been published separately and are referenced where available.

Please note that the point release does not constitute a new version of Debian 12 but only updates some of the packages included. There is no need to throw away old bookworm media. After installation, packages can be upgraded to the current versions using an up-to-date Debian mirror.

Those who frequently install updates from security.debian.org won't have to update many packages, and most such updates are included in the point release.

New installation images will be available soon at the regular locations.

Upgrading an existing installation to this revision can be achieved by pointing the package management system at one of Debian's many HTTP mirrors. A comprehensive list of mirrors is available at:

Debian_12

Known issues

Linux 6.1.137-1, included with Debian 12.11 is unable to load the watchdog and w83977f_wdt modules on the amd64 architecture. This is a regression.

This issue will be fixed in a forthcoming update.

Users who rely on the watchdog functionality should disable their watchdog or avoid upgrading to this version of the kernel until a fix is available.

Miscellaneous Bugfixes

This stable update adds a few important corrections to the following packages:

PackageReason
abseilFix heap buffer overflow issue [CVE-2025-0838]; fix build failure on ppc64el
adonthellFix compatibility with SWIG 4.1
base-filesUpdate for the point release
bashRebuild for outdated Built-Using (glibc/2.36-9+deb12u5)
busyboxRebuild for outdated Built-Using (glibc/2.36-9)
cdebootstrapRebuild for outdated Built-Using (glibc/2.36-9)
chkrootkitRebuild for outdated Built-Using (glibc/2.36-9+deb12u5)
crowdsecRebuild for outdated Built-Using (docker.io/20.10.24+dfsg1-1)
darRebuild for outdated Built-Using (glibc/2.36-9+deb12u5)
debian-archive-keyringAdd archive signing and SRM keys for trixie (Debian 13); move buster (Debian 10) keys to removed keyring
debian-installerIncrease Linux kernel ABI to 6.1.0-35; rebuild against proposed-updates
debian-installer-netboot-imagesRebuild against proposed-updates
debian-security-supportUpdate list of packages receiving limited support, or unsupported, in bookworm
distro-info-dataAdd Debian 15 and Ubuntu 25.10
docker.ioRebuild for outdated Built-Using (containerd/1.6.20~ds1-1, glibc/2.36-9+deb12u8)
dpdkNew upstream stable release
fig2devReject huge pattern lengths [CVE-2025-31162]; reject arcs with co-incident points [CVE-2025-31163]; allow an arc-box with zero radius [CVE-2025-31164]
fossilFix interaction with an Apache HTTP server including the fix for CVE-2024-24795
gcc-12Fix -fstack-protector handling of overflows on AArch64 [CVE-2023-4039]
gcc-mingw-w64Rebuild for outdated Built-Using (gcc-12/12.2.0-13)
glib2.0Fix integer overflow in g_date_time_new_from_iso8601() [CVE-2025-3360]
golang-github-containerd-stargz-snapshotterRebuild for outdated Built-Using (containerd/1.6.20~ds1-1, runc/1.1.5+ds1-1)
golang-github-containers-buildahRebuild for outdated Built-Using (containerd/1.6.20~ds1-1)
golang-github-openshift-imagebuilderRebuild for outdated Built-Using (containerd/1.6.20~ds1-1, docker.io/20.10.24+dfsg1-1)
haproxyFix heap buffer overflow issue [CVE-2025-32464]
igtf-policy-bundleBackport current policy bundle
imagemagickFix MIFF image depth mishandled after SetQuantumFormat [CVE-2025-43965]
initramfs-toolsRestore copy_file's handling of target ending in slash; exclude usr-merge symlinks in copy_file; add reset drivers when MODULES=dep
krb5Fix memory leak in ndr.c [CVE-2024-26462]; prevent buffer overflow when calculating ulog buffer size [CVE-2025-24528]
libbson-xs-perlFix security issues in embedded copy of libbson: denial of service [CVE-2017-14227]; buffer over-read [CVE-2018-16790]; infinite loop [CVE-2023-0437]; memory corruption [CVE-2024-6381]; buffer overflows [CVE-2024-6383 CVE-2025-0755]
libcap2Fix incorrect recognition of group names [CVE-2025-1390]
libdata-entropy-perlSeed entropy pool with urandom by default [CVE-2025-1860]
libpodRebuild for outdated Built-Using (containerd/1.6.20~ds1-1, docker.io/20.10.24+dfsg1-1, golang-github-containers-buildah/1.28.2+ds1-3)
libsub-handlesvia-perlFix arbitrary code execution issue [CVE-2025-30673]
linuxNew upstream release; bump ABI to 35
linux-signed-amd64New upstream release; bump ABI to 35
linux-signed-arm64New upstream release; bump ABI to 35
linux-signed-i386New upstream release; bump ABI to 35
logcheckRespect removal of /etc/logcheck/header.txt
mongo-c-driverFix infinite loop issue [CVE-2023-0437]; fix integer overflow issue [CVE-2024-6381]; fix buffer overflow issues [CVE-2024-6383 CVE-2025-0755]
network-managerFix crash dereferencing NULL pointer during debug logging [CVE-2024-6501]
nginxFix buffer underread and unordered chunk vulnerabilities in mp4 [CVE-2024-7347]
node-fstream-ignoreFix build failure by not running tests in parallel
node-sendFix cross-site scripting issue [CVE-2024-43799]
node-serialize-javascriptFix cross-site scripting issue [CVE-2024-11831]
nvidia-graphics-driversNew upstream stable release; remove ppc64el support (migrated to src:nvidia-graphics-drivers-tesla-535); fix build issues with newer kernel versions; security fixes [CVE-2024-0131 CVE-2024-0147 CVE-2024-0149 CVE-2024-0150 CVE-2024-53869 CVE-2025-23244]
nvidia-graphics-drivers-teslaNew upstream stable release; transition to packages from src:nvidia-graphics-drivers-tesla-535 on ppc64el; fix build issues with newer kernel versions
nvidia-graphics-drivers-tesla-535New package for the now EOL ppc64el support
nvidia-open-gpu-kernel-modulesNew upstream stable release; security fixes [CVE-2024-0131 CVE-2024-0147 CVE-2024-0149 CVE-2024-0150 CVE-2024-53869 CVE-2025-23244]
nvidia-settingsNew upstream stable release; drop support for some obsolete packages; relax the nvidia-alternative dependency to a suggestion on ppc64el
openrazerFix out of bounds read issue [CVE-2025-32776]
opensnitchRebuild for outdated Built-Using (golang-github-google-nftables/0.1.0-3)
opensshFix the DisableForwarding directive [CVE-2025-32728]
opensslNew upstream stable release; fix timing side channel issue [CVE-2024-13176]
openvpnAvoid possible ASSERT() on OpenVPN servers using --tls-crypt-v2 [CVE-2025-2704]; prevent malicious peer DoS or log-flooding [CVE-2024-5594]; refuse multiple exit notifications from authenticated clients [CVE-2024-28882]; update expired certificates in build tests
phpmyadminFix XSS vulnerabilities [CVE-2025-24529 CVE-2025-24530]
policyd-rate-limitFix startup with newer python3-yaml
popplerFix crash on malformed files [CVE-2023-34872]; fix out-of-bounds read issues [CVE-2024-56378 CVE-2025-32365]; fix floating point exception issue [CVE-2025-32364]
postgresql-15New upstream stable release; fix buffer over-read issue [CVE-2025-4207]
prometheusRebuild for outdated Built-Using (docker.io/20.10.24+dfsg1-1)
prometheus-postfix-exporterRebuild for outdated Built-Using (docker.io/20.10.24+dfsg1-1)
python-h11Fix request smuggling issue [CVE-2025-43859]
python3.11Fix misparsing issues [CVE-2025-0938 CVE-2025-1795]
qemuRebuild for outdated Built-Using (glibc/2.36-9+deb12u9, gnutls28/3.7.9-2+deb12u3); new upstream bugfix release
qtbase-opensource-srcDelay HTTP2 communication until encrypted() can be responded to [CVE-2024-39936]; fix crash with null checks in table iface methods
redisFix denial of service issue [CVE-2025-21605]
renaissanceAvoid exception on startup
sashRebuild for outdated Built-Using (glibc/2.36-9)
shadowFix password leak issue [CVE-2023-4641]; fix chfn control character injection issue [CVE-2023-29383]
skeemaRebuild for outdated Built-Using (containerd/1.6.20~ds1-1, docker.io/20.10.24+dfsg1-1)
skopeoRebuild for outdated Built-Using (docker.io/20.10.24+dfsg1-1)
telegram-desktopRebuild for outdated Built-Using (ms-gsl/4.0.0-2)
tripwireRebuild for outdated Built-Using (glibc/2.36-9+deb12u5)
twitter-bootstrap3Fix cross-site scripting issues [CVE-2024-6485 CVE-2024-6484]
twitter-bootstrap4Fix cross-site scripting issue [CVE-2024-6531]
tzdataNew America/Coyhaique zone for Aysén Region in Chile
user-mode-linuxRebuild for outdated Built-Using (linux/6.1.82-1)
varnishPrevent HTTP/1 client-side desync [CVE-2025-30346]
wireless-regdbNew upstream release
xmedconFix buffer overflow [CVE-2025-2581]
zshRebuild for outdated Built-Using (glibc/2.36-9+deb12u5, libcap2/1:2.66-4)

Security Updates

This revision adds the following security updates to the stable release. The Security Team has already released an advisory for each of these updates:

Advisory IDPackage
DSA-5877 chromium
DSA-5878 php8.2
DSA-5879 opensaml
DSA-5880 freetype
DSA-5881 rails
DSA-5882 chromium
DSA-5883 mercurial
DSA-5884 libxslt
DSA-5885 webkit2gtk
DSA-5886 ruby-rack
DSA-5887 exim4
DSA-5888 ghostscript
DSA-5889 firefox-esr
DSA-5890 chromium
DSA-5891 thunderbird
DSA-5892 atop
DSA-5893 tomcat10
DSA-5894 jetty9
DSA-5895 xz-utils
DSA-5896 trafficserver
DSA-5897 lemonldap-ng
DSA-5898 chromium
DSA-5899 webkit2gtk
DSA-5900 linux-signed-amd64
DSA-5900 linux-signed-arm64
DSA-5900 linux-signed-i386
DSA-5900 linux
DSA-5901 mediawiki
DSA-5902 perl
DSA-5903 chromium
DSA-5904 libapache2-mod-auth-openidc
DSA-5905 graphicsmagick
DSA-5906 erlang
DSA-5907 linux-signed-amd64
DSA-5907 linux-signed-arm64
DSA-5907 linux-signed-i386
DSA-5907 linux
DSA-5908 libreoffice
DSA-5909 request-tracker5
DSA-5910 firefox-esr
DSA-5911 request-tracker4
DSA-5912 thunderbird
DSA-5913 openjdk-17
DSA-5915 vips
DSA-5917 libapache2-mod-auth-openidc

Removed packages

The following packages were removed due to circumstances beyond our control:

PackageReason
pidgin-skypeUseless as service discontinued
viageeNo longer able to connect to gmail

Debian Installer

The installer has been updated to include the fixes incorporated into stable by the point release.

URLs

The complete lists of packages that have changed with this revision:

The current stable distribution:


Proposed updates to the stable distribution:


stable distribution information (release notes, errata etc.):


Security announcements and information: