Debian 10694 Published by

The Debian project has released Debian GNU/Linux 12.12, which focuses on addressing security concerns and bug fixes in the existing old stable distribution. The release includes numerous security updates and bug fixes across a wide range of packages, including Apache2, Botan, Expatriated Expat, Glibc, Libxml2, OpenSSL, PostgreSQL-15, and Python-Django. This update aims to enhance the stability and security of the system, with the Debian Installer also updated to incorporate these fixes for new installations.



Debian GNU/Linux 12.12 Released

The Debian project has announced the twelfth update to its old stable distribution, Debian 12 (Bookworm). This point release brings essential security updates and fixes for various critical issues.

Debian_12

Key Highlights
  • The update mainly focuses on addressing security vulnerabilities, with many packages receiving important corrections.
  • No need to discard existing installation media; simply upgrade using an up-to-date Debian mirror.
  • New installation images will be available at the regular locations soon.
Packages Affected by Security Updates

This release includes numerous security updates for various packages. Some of the notable ones are:

  • Apache2: Multiple CVEs addressed, including HTTP response splitting and server-side request forgery issues.
  • Botan: Fixes for denial-of-service issues and improper parsing of name constraints.
  • Clamav: New upstream stable release with buffer overflow fixes.
  • Docker.io: Rebuilt against glibc 2.36-9+deb12u12.
  • Expat: Denial-of-service issue fixes, parser crash fix, and potential buffer overflows in the interactive shell.
  • Firebird3.0: NULL pointer dereference issue fixed.
  • Glibc: Multiple CVEs addressed, including incorrect LD_LIBRARY_PATH search, memory layout issues, SVE implementation of memset on aarch64, and double free issue.
  • Jinja2: Arbitrary code execution issue fixed.
  • Libxml2: Integer overflow in xmlBuildQName, potential buffer overflows, use-after-free, and type confusion issues addressed.
  • OpenSSL: New upstream stable release with ABI compatibility changes to avoid crashes.
  • PostgreSQL-15: Security checks tightened, pg_dump scripts protection from being used as attacks.
  • Python-django: Various CVEs fixed, including regular expression-based denial-of-service issues and SQL injection vulnerabilities.
  • Webpy: Fixed SQL injection issue.
Other Notable Updates

The update also includes fixes for several non-security-related issues:

  • Debian-installer: Increased Linux kernel ABI to 6.1.0-39 and rebuilt against oldstable-proposed-updates.
  • Debian-installer-netbook-images: Rebuilt against oldstable-proposed-updates.
  • Distro-info-data: Added Ubuntu end-of-Legacy Support dates, release, and estimated EoL for trixie.
  • Djvulibre: Denial-of-service issue fixes.
  • Docker.io: Rebuilt against glibc 2.36-9+deb12u12.
  • Expat: Denial-of-service issue fixes, parser crash fix, and potential buffer overflows in the interactive shell.
  • Firebird3.0: NULL pointer dereference issue fixed.
  • Glibc: Multiple CVEs addressed, including incorrect LD_LIBRARY_PATH search, memory layout issues, SVE implementation of memset on aarch64, and double free issue.
  • Jinja2: Arbitrary code execution issue fixed.
  • Libxml2: Integer overflow in xmlBuildQName, potential buffer overflows, use-after-free, and type confusion issues addressed.
  • OpenSSL: New upstream stable release with ABI compatibility changes to avoid crashes.
  • PostgreSQL-15: Security checks tightened, pg_dump scripts protection from being used as attacks.
  • Python-django: Various CVEs fixed, including regular expression-based denial-of-service issues and SQL injection vulnerabilities.
Installation and Upgrade Instructions

For existing installations:

  1. Update the package list by running apt update.
  2. Upgrade packages using apt full-upgrade.

For new installations, wait for the updated installation images to become available at the regular locations.

Updated packages in detail

This update for the oldstable version introduces several significant corrections to the following packages:

PackageReason
amd64-microcodeUpdate AMD-SEV firmware [CVE-2024-56161]; update included microcode
aomFix libaom encoder output validity
apache2New upstream stable release; fix HTTP response splitting issue [CVE-2024-42516]; fix server-side request forgery issue [CVE-2024-43204 CVE-2024-43394]; fix log injection issue [CVE-2024-47252]; fix access control bypass issue [CVE-2025-23048]; fix denial of service issue [CVE-2025-49630]; fix potential man-in-the-middle issue [CVE-2025-49812]; fix memory lifetime management issue [CVE-2025-53020]
b43-fwcutterUpdate firmware URL
balboaRebuild against glibc 2.36-9+deb12u12
base-filesUpdate for the point release
bashRebuild against glibc 2.36-9+deb12u12
botanFix denial of service issues [CVE-2024-34702 CVE-2024-34703]; fix improper parsing of name constraints [CVE-2024-39312]; fix compiler-induced secret-dependent operation issue [CVE-2024-50383]
busyboxRebuild against glibc 2.36-9+deb12u12
ca-certificatesAdd Sectigo Public Server Authentication Root E46 and Sectigo Public Server Authentication Root R46
catatonitRebuild against glibc 2.36-9+deb12u12
cdebootstrapRebuild against glibc 2.36-9+deb12u12
chkrootkitRebuild against glibc 2.36-9+deb12u12
cjsonFix denial of service issue [CVE-2023-26819]; fix buffer overflow issue [CVE-2023-53154]
clamavNew upstream stable release; fix buffer overflow issues [CVE-2025-20128 CVE-2025-20260]
cloud-initMake hotplug socket writable only by root [CVE-2024-11584]; don't attempt to identify non-x86 OpenStack instances [CVE-2024-6174]
commons-beanutilsFix improper access control issue [CVE-2025-48734]
commons-vfsFix path traversal issue [CVE-2025-27553]
corosyncFix buffer overflow vulnerability on large UDP packets [CVE-2025-30472]
criuFix restore functionality of mount namespaces with newer kernel versions
curlFix regression handling s ftp://host/~ URIs; fix a memory leak
darRebuild against glibc 2.36-9+deb12u12
debian-edu-configFix quoting in Exim configuration; gosa-sync: fix password verification; fix quoting in gosa.conf
debian-installerIncrease Linux kernel ABI to 6.1.0-39; rebuild against oldstable-proposed-updates; add console-setup-pc-ekmap for arm64 and armhf CD images; use nomodeset rather than fb=false to disable framebuffer
debian-installer-netbook-imagesRebuild against oldstable-proposed-updates
debian-security-supportQuery source:Package instead of Source to get the correct list of packages; fix typo related to gobgp
distro-info-dataAdd Ubuntu end of Legacy Support dates; add release and estimated EoL for trixie
djvulibreFix denial of service issues [CVE-2021-46310 CVE-2021-46312]
docker.ioRebuild against glibc 2.36-9+deb12u12
dpdkNew upstream stable release
dropbearFix shell injection vulnerability in multihop handling [CVE-2025-47203]
e2fsprogsRebuild against glibc 2.36-9+deb12u12
erlangssh: fix strict KEX hardening [CVE-2025-46712]; zip: sanitize pathnames when extracting files with absolute pathnames [CVE-2025-4748]; fix documentation build failure with newer xsltproc versions
expatFix denial of service issues [CVE-2023-52425 CVE-2024-8176]; fix parser crash [CVE-2024-50602]
fig2devDetect nan in spline control values [CVE-2025-46397]; permit \0 in 2nd line in fig file [CVE-2025-46398]; ge output: correct spline computation [CVE-2025-46399]; reject arcs with a radius smaller than 3 [CVE-2025-46400]
firebird3.0Fix NULL pointer dereference issue [CVE-2025-54989]
fort-validatorFix denial of service issues [CVE-2024-45234 CVE-2024-45235 CVE-2024-45236 CVE-2024-45238 CVE-2024-45239 CVE-2024-48943]; fix buffer overflow issue [CVE-2024-45237]
galera-4New upstream stable release
glib2.0Fix buffer underflow issue [CVE-2025-4373 CVE-2025-7039]; improve upgrade safety
glibcFix incorrect LD_LIBRARY_PATH search in dlopen for static setuid binaries [CVE-2025-4802]; improve memory layout of structures in exp/exp10/expf functions; add an SVE implementation of memset on aarch64; improve generic implementation of memset on aarch64; fix double free issue [CVE-2025-8058]
gnupg2Rebuild against glibc 2.36-9+deb12u12; fix recommends of architecture-any packages on architecture-all package to support binNMUs
golang-github-gin-contrib-corsFix mishandling of wildcards [CVE-2019-25211]
gst-plugins-base1.0Fix buffer overrun issue [CVE-2025-47806]; fix NULL pointer dereference issues [CVE-2025-47807 CVE-2025-47808]
gst-plugins-good1.0Fix possible information disclosure issue [CVE-2025-47219]
init-system-helpersFix handling of os-release diversions from live-build, ensuring they don't exist in non-live systems
insighttoolkit4Fix build on systems with a single CPU
insighttoolkit5Fix build on systems with a single CPU
integritRebuild against glibc 2.36-9+deb12u12
iperf3Fix buffer overflow issue [CVE-2025-54349]; fix assertion failure [CVE-2025-54350]
jinja2Fix arbitrary code execution issue [CVE-2025-27516]
jqZero-terminate string in jv.c [CVE-2025-48060]
kexec-toolsRemove no longer required dependencies
kmail-account-wizardFix man in the middle attack issue [CVE-2024-50624]
krb5Fix message tampering issue [CVE-2025-3576]; disable issuance of tickets using RC4 or triple-DES session keys by default
kubernetesSanitise raw data output to terminal [CVE-2021-25743]; hide long and multi-line strings when printing
libarchiveFix integer overflow issues [CVE-2025-5914 CVE-2025-5916], buffer over read issue [CVE-2025-5915], buffer overlow issue [CVE-2025-5917]
libbpfFix operation with newer systemd versions
libcap2Rebuild against glibc 2.36-9+deb12u12; add missing Built-Using: glibc
libcgi-simple-perlFix HTTP response splitting issue [CVE-2025-40927]
libfcgiFix integer overflow issue [CVE-2025-23016]
libfile-tail-perlFix uninitialized variable issue
libphp-adodbFix SQL injection vulnerability in pg_insert_id() [CVE-2025-46337]
librawFix out-of-bounds read issues [CVE-2025-43961 CVE-2025-43962 CVE-2025-43963]; enforce minimum w0 and w1 values [CVE-2025-43964]
libreofficeAdd EUR support for Bulgaria
libsndfileFix integer overflow issues [CVE-2022-33065]; fix out of bounds read issue [CVE-2024-50612]
libsoup3New upstream bug-fix release; fix buffer overrun issue [CVE-2024-52531]; fix denial of service issues [CVE-2024-52532 CVE-2025-32051]; fix heap overflow issues [CVE-2025-32052 CVE-2025-32053]; fix integer overflow issue [CVE-2025-32050]; fix heap buffer overflow issues [CVE-2025-2784]; reject HTTP headers if they contain null bytes [CVE-2024-52530]; fix denial of service issues [CVE-2025-32909 CVE-2025-32910 CVE-2025-46420 CVE-2025-32912 CVE-2025-32906]; fix memory management issues [CVE-2025-32911 CVE-2025-32913]; fix credential disclosure issue [CVE-2025-46421]; fix use-after-free during disconnection, which can cause GNOME Calculator to hang at startup; fix a test failure on some 32-bit systems
libtheoraFix segfault during decoder initialisation; avoid possible bit-shifting in decoder
libtpmsFix out of bounds read issue [CVE-2025-49133]
libxml2Fix integer overflow issue in xmlBuildQName [CVE-2025-6021]; fix potential buffer overflows in the interactive shell [CVE-2025-6170]; fix use-after-free issue in xmlSchematronReportOutput [CVE-2025-49794]; fix type confusion issue in xmlSchematronReportOutput [CVE-2025-49796]
libyaml-libyaml-perlFix arbitrary file edit issue [CVE-2025-40908]
lintianAdd bookworm to duke to the list of known Debian release names; don't emit source-nmu-has-incorrect-version-number for stable updates
linuxNew upstream stable release; increase ABI to 39
linux-signed-amd64New upstream stable release; increase ABI to 39
linux-signed-arm64New upstream stable release; increase ABI to 39
linux-signed-i386New upstream stable release; increase ABI to 39
llvm-toolchain-19New upstream stable release
luajitFix buffer overflow issue [CVE-2024-25176]; fix denial of service issue [CVE-2024-25177]; fix out-of-bounds read issue [CVE-2024-25178]
lxcRebuild against glibc 2.36-9+deb12u12
mailgraphUpdate embedded copy of Parse::Syslog, enabling support for RFC3339 dates
mariadbNew upstream stable release; security fixes [CVE-2023-52969 CVE-2023-52970 CVE-2023-52971 CVE-2025-30693 CVE-2025-30722]; fix restart after out of memory; new upstream stable release; fix variable name in debian-start.sh
mkchromecastReplace youtube-dl with yt-dlp
mltFix Python scripts
monoRemove unneeded (and broken) mono-source package
mosquittoFix memory leak issue [CVE-2023-28366]; fix out of bounds memory access issue [CVE-2024-10525]; fix double free issue [CVE-2024-3935]; fix possible segmentation fault issue [CVE-2024-8376]
multipath-toolsReinstate ANA prioritizer in build process
nextcloud-desktopFix share options in graphical interface
nginxFix potential information leak in ngx_mail_smtp_module [CVE-2025-53859]
node-addon-apiAdd support for nodejs >= 18.20
node-csstypeFix build failure
node-form-dataFix insufficient randomness issue [CVE-2025-7783]
node-minipassFix tap reporter in auto test and autopkgtest
node-nodeunitFix test flakiness
node-tar-fsFix path traversal issues [CVE-2024-12905 CVE-2025-48387]
node-tmpFix arbitrary file write issue [CVE-2025-54798]
nvda2speechdFix required rmp-serde version
openjpeg2Fix NULL pointer dereference issue [CVE-2025-50952]
opensshHandle OpenSSL >=3 ABI compatibility to avoid new SSH connections failing during upgrades to trixie
opensslNew upstream stable release; revert some upstream changes to avoid crashes in downstream software
perlFix TLS certificate verification issue [CVE-2023-31484]; fix non thread safe file access [CVE-2025-40909]
postgresql-15New upstream stable release; tighten security checks in planner estimation functions [CVE-2025-8713]; prevent pg_dump scripts from being used to attack the user running the restore [CVE-2025-8714]; convert newlines to spaces in names included in comments in pg_dump output [CVE-2025-8715]
postgresql-commonPgCommon.pm: Set defined path in prepare_exec. Fixes compatibility with trixie's perl version
prodyFix build failure; add tolerance to some tests which now fail on i386
python-djangoFix regular expression-based denial of service issue [CVE-2023-36053], denial of service issues [CVE-2024-38875 CVE-2024-39614 CVE-2024-41990 CVE-2024-41991], user enumeration issue [CVE-2024-39329], directory traversal issue [CVE-2024-39330], excessive memory consumption issue [CVE-2024-41989], SQL injection issue [CVE-2024-42005]
python-flask-corsFix log data injection issue [CVE-2024-1681]; fix improper path processing issues [CVE-2024-6866 CVE-2024-6839 CVE-2024-6844]
python-mitogenSupport targets with Python >= 3.12
python-zippFix denial of service issue [CVE-2024-5569]
qemuRebuild against glibc 2.36-9+deb12u12; new upstream bugfix release
raptor2Fix integer underflow issue [CVE-2024-57823]; fix heap read buffer overflow issue [CVE-2024-57822]
rarNew upstream release; fix ANSI escape injection issue [CVE-2024-33899]
rubygemsFix credential leak issue [CVE-2025-27221]; fix regular expression related denial of service issue [CVE-2023-28755]
rust-cbindgen-webRebuild against current rustc-web
rustc-webNew upstream stable release, to support building of newer Chromium versions
sambaFix various bugs following a change to Microsoft Active Directory
sashRebuild against glibc 2.36-9+deb12u12
setuptoolsFix arbitrary file write issue [CVE-2025-47273]
shaarliFix cross site scripting issue [CVE-2025-55291]
simplesamlphpFix signature verification issue [CVE-2025-27773]
snapdRebuild against glibc 2.36-9+deb12u12
sqlite3Fix memory corruption issue [CVE-2025-6965]; fix bug in NOT NULL/IS NULL optimization that can cause invalid data
superminRebuild against glibc 2.36-9+deb12u12
systemdNew upstream stable release
tiniRebuild against glibc 2.36-9+deb12u12
tripwireRebuild against glibc 2.36-9+deb12u12
tsocksRebuild against glibc 2.36-9+deb12u12
tzdataConfirm leap second status for 2025
usb.idsNew upstream update
waitressFix race condition in HTTP pipelining [CVE-2024-49768]; fix denial of service issue [CVE-2024-49769]
webpyFix SQL injection issue [CVE-2025-3818]
wireless-regdbNew upstream release, updating included regulatory data; permit 320 MHz bandwidth in 6 GHz band for GB
wolfsslFix insufficient randomisation issue [CVE-2025-7394]
wpaFix inappropriate reuse of PKEX elements [CVE-2022-37660]
xfce4-weather-pluginMigrate to new APIs; update translations
xrdpFix session restrictions bypass issue [CVE-2023-40184]; fix out-of-bounds read issue [CVE-2023-42822]; fix login restrictions bypass issue [CVE-2024-39917]
ydotoolRebuild against glibc 2.36-9+deb12u12
zshRebuild against glibc 2.36-9+deb12u12

This update incorporates the latest security enhancements for the oldstable release:

Advisory IDPackage
DSA-5914 chromium
DSA-5916 chromium
DSA-5918 varnish
DSA-5919 open-vm-tools
DSA-5920 chromium
DSA-5921 thunderbird
DSA-5922 firefox-esr
DSA-5923 net-tools
DSA-5924 intel-microcode
DSA-5925 linux-signed-amd64
DSA-5925 linux-signed-arm64
DSA-5925 linux-signed-i386
DSA-5925 linux
DSA-5926 firefox-esr
DSA-5927 yelp-xsl
DSA-5927 yelp
DSA-5928 libvpx
DSA-5929 chromium
DSA-5930 libavif
DSA-5931 systemd
DSA-5932 thunderbird
DSA-5933 tcpdf
DSA-5934 roundcube
DSA-5935 chromium
DSA-5936 libfile-find-rule-perl
DSA-5937 webkit2gtk
DSA-5938 python-tornado
DSA-5939 gimp
DSA-5940 modsecurity-apache
DSA-5941 gst-plugins-bad1.0
DSA-5942 chromium
DSA-5943 libblockdev
DSA-5943 udisks2
DSA-5944 chromium
DSA-5945 konsole
DSA-5946 gdk-pixbuf
DSA-5947 xorg-server
DSA-5948 trafficserver
DSA-5949 libxml2
DSA-5950 firefox-esr
DSA-5951 icu
DSA-5952 chromium
DSA-5953 catdoc
DSA-5954 sudo
DSA-5955 chromium
DSA-5956 ring
DSA-5957 mediawiki
DSA-5958 jpeg-xl
DSA-5959 thunderbird
DSA-5960 djvulibre
DSA-5961 slurm-wlm
DSA-5962 gnutls28
DSA-5963 chromium
DSA-5964 firefox-esr
DSA-5965 chromium
DSA-5966 thunderbird
DSA-5967 php8.2
DSA-5968 chromium
DSA-5969 redis
DSA-5970 sope
DSA-5971 chromium
DSA-5972 openjdk-17
DSA-5973 linux-signed-amd64
DSA-5973 linux-signed-arm64
DSA-5973 linux-signed-i386
DSA-5973 linux
DSA-5974 pgpool2
DSA-5976 chromium
DSA-5977 aide
DSA-5978 webkit2gtk
DSA-5979 libxslt
DSA-5980 firefox-esr
DSA-5981 chromium
DSA-5982 squid
DSA-5983 qemu
DSA-5984 thunderbird
DSA-5985 ffmpeg
DSA-5986 node-cipher-base
DSA-5987 unbound
DSA-5988 chromium
DSA-5989 udisks2
DSA-5990 libxml2
DSA-5991 nodejs

The subsequent packages have been removed:

PackageReason
guixUnsupportable; security issues
Debian Installer Updates

The Debian Installer has been updated to include the fixes from this specific point release. This ensures that new installations of Debian 12.12 will include the latest security updates and bug fixes.

Download

A comprehensive list of mirrors is available at: https://www.debian.org/mirror/list

Conclusion

The Debian 12.12 update addresses numerous security concerns and bug fixes, enhancing the stability and security of the system. The removal of unsupportable packages and incorporation of fixes into the Debian Installer further contribute to a more secure and reliable experience for users.