Debian 10915 Published by

Debian 12.14 delivers essential security patches for the oldstable Bookworm distribution, addressing critical vulnerabilities in foundational components like glibc, openssh, apache2, and 7zip. System administrators should apply these updates immediately using apt full-upgrade followed by a system reboot to ensure all kernel and library fixes are properly loaded. The release also removes unmaintained packages such as Suricata and Zulucrypt from the main repository due to unresolved security concerns. With dozens of new security advisories covering browsers, databases, and network services, keeping this point release current is mandatory for maintaining a secure Debian environment.



Debian 12.14 Update Fixes Critical CVEs in Glibc and Openssh

Debian 12.14 has arrived as the fourteenth point release for the oldstable Bookworm distribution, bringing a heavy load of security patches and bugfixes that affect core system components. This update addresses vulnerabilities in glibc, openssh, apache2, and numerous other packages that could allow remote code execution or privilege escalation. Skipping this release leaves systems exposed to known exploits, so applying the changes should be the top priority for anyone running Debian 12. System administrators often see broken package states accumulate when point releases are ignored for months, leading to difficult upgrade paths later. Debian 12.14 helps prevent this drift by bundling dozens of fixes into a single update cycle that keeps the oldstable branch secure and stable.

Debian_12

What Debian 12.14 Actually Fixes

The release notes highlight serious issues in foundational libraries and services that demand attention. Glibc receives patches for integer overflows and uninitialized memory use that could crash applications or leak sensitive data to unauthorized processes. Openssh gets fixed against code execution vulnerabilities, which is critical since ssh serves as the primary access point for remote management on almost every server. Apache2 also sees multiple corrections for privilege escalation and authentication bypasses that could compromise web servers handling user traffic. The 7zip package receives a new upstream release to handle integer underflow issues that might lead to code execution when processing malicious archives. These are not minor tweaks; they are essential hardening measures that close doors attackers love to use.

How to Apply the Debian 12.14 Update

Applying the update requires pointing the package manager at a mirror and running an upgrade command that handles dependency changes safely. Users should open a terminal and execute sudo apt update followed by sudo apt full-upgrade. The full-upgrade flag is necessary here because it allows the removal of obsolete packages or installation of new dependencies, which prevents broken states that can occur with a standard upgrade when package relationships shift. After the installation completes, a reboot is required to ensure the new kernel and glibc libraries are loaded into memory. New installation images will be available soon for fresh installs, but existing systems do not need to be reinstalled to get these fixes. Running the update now saves time compared to dealing with a compromised system later.

Removed Packages and Backports

Two packages have been dropped from the main repository due to maintenance issues or security concerns that make them unsupportable in this release. Suricata is no longer maintained in the main archive, so users who need intrusion detection should switch to backports immediately rather than waiting for a fix that will never arrive. Zulucrypt was removed because of unmaintained status and known security problems that cannot be addressed within the current framework. Relying on these tools after this update will result in unpatched vulnerabilities, so migration plans should be implemented right away. The Debian project has made it clear that unsupported software does not belong in the stable distribution, and removing these packages protects users from false confidence in their security posture.

Security Advisories and Kernel Updates

The Debian security team has published dozens of advisories ranging from DSA-6003 to DSA-6265, covering Firefox ESR, Chromium, GIMP, VLC, and the Linux kernel itself. Kernel updates are included for amd64, arm64, and i386 architectures to address vulnerabilities that could allow local privilege escalation or denial of service attacks. System administrators should verify the running kernel version after reboot to confirm the update took effect across all installed components. The comprehensive list of changes is available in the Debian changelog for those who need to audit specific package versions before deploying to production servers. Keeping track of these advisories ensures that no critical patch slips through the cracks during routine maintenance windows.

Miscellaneous Bugfixes

This oldstable update adds a few important corrections to the following packages:

PackageReason
7zipNew upstream stable release; fix integer underflow issue [CVE-2023-31102]; fix code execution issues [CVE-2023-40481 CVE-2025-11001 CVE-2025-11002]; fix denial of service issue [CVE-2024-11612]; fix null pointer dereference issue [CVE-2025-53817]; fix handling of symbolic links [CVE-2025-55188]
apache2New upstream release: fix http2 regression; fix use-after-free issue [CVE-2026-23918]; fix privilege escalation issue [CVE-2026-24072]; fix NULL pointer dereference issues [CVE-2026-29169 CVE-2026-33007]; fix authentication bypass issue [CVE-2026-33006]; fix HTTP response splitting issue [CVE-2026-33523]; fix out-of-bounds read issues [CVE-2026-33857 CVE-2026-34032]; fix buffer over-read issue [CVE-2026-34059]
arduino-core-avrNew upstream stable release; fix buffer overflow issue [CVE-2025-69209]
augeasFix NULL pointer dereference issue [CVE-2025-2588]
awstatsPrevent command injection [CVE-2025-63261]
base-filesUpdate for the point release
bashRebuild with updated glibc
busyboxFix stack overflow [CVE-2022-48174] and use-after-free [CVE-2023-42363 CVE-2023-42364 CVE-2023-42365] errors
c3p0Fix recursive entity expansion issue [CVE-2019-5427]
calibreFix path traversal issues [CVE-2026-25635 CVE-2026-25636 CVE-2026-26064 CVE-2026-26065]; fix code execution issue [CVE-2026-25731]; fix HTTP response header injection issue [CVE-2026-27810]; fix IP ban bypass issue [CVE-2026-27824]
cdebootstrapRebuild with updated glibc
chkrootkitRebuild with updated glibc
chronyOpen the PHC reference clock with the O_RDWR flag when enabling the extpps option
composerFix code execution issue [CVE-2023-43655]; fix command injection issues [CVE-2026-40261 CVE-2026-40176]
containerdFix CRI Attach implementation [CVE-2025-64329]; fix overly broad directory permissions [CVE-2024-25621]; fix large UID:GID (> 32bit) overflow [CVE-2024-40635]
darRebuild with updated glibc
debian-installerBump linux ABI to 6.1.0-47
debian-installer-netboot-imagesRebuild against oldstable-proposed-updates
debsig-verifyRebuild with updated dpkg
deetsRebuild with updated dpkg
distro-info-dataAdd Ubuntu 26.10 Stonking Stingray
docker.ioRebuild with updated containerd, glibc
dovecotCorrect incomplete backport of CVE-2026-27855 fix; fix memory leak in CVE-2026-27857 fix
dpkgNew upstream stable release; fix insufficient permissions check leading to possible denial of service issue [CVE-2025-6297]; fix denial of service issue [CVE-2026-2219]; fix buffer over-read issue; fix uninitialized variable warning with Rules-Requires-Root; fix segmentation fault in dpkg-trigger; translation fixes
erlangFix denial of service issues [CVE-2025-48038 CVE-2025-48039 CVE-2025-48040 CVE-2025-48041]; fix HTTP request smuggling issue [CVE-2026-23941]; fix path traversal issues [CVE-2026-23942 CVE-2026-21620]; fix compression bomb issue [CVE-2026-23943]
exim4Fix GnuTLS hostname verify of a server certificate with a zero-length Subject; fix denial of service issue [CVE-2026-40684]; fix out-of-bounds read/write issues [CVE-2026-40685 CVE-2026-40686 CVE-2026-40687]
fonttoolsFix XML External Entity injection issue [CVE-2023-45139]; fix code execution issue [CVE-2025-66034]
glanceFix server-side request forgery issue [CVE-2026-34881]; fix build failure
glib2.0Fix timezone handling with Debian & Ubuntu's symlinks; fix missing input validation in g_buffered_input_stream_peek [CVE-2026-0988]; fix integer overflow in base64 encoding [CVE-2026-1484]; fix buffer underflow issue in content type parsing [CVE-2026-1485]; fix integer overflow in unicode conversion [CVE-2026-1489]
glibcFix integer overflow issue [CVE-2026-0861]; fix uninitialised memory use issue [CVE-2025-15281]; fix incorrect handling of DNS responses [CVE-2026-4437]; fix return of invalid DNS hostnames [CVE-2026-4438]; fix assertion failure [CVE-2026-4046]; fix performance bottleneck with ASAN on 32-bit arm; fix incorrect backtrace unwinding; fix typo in wmemset ifunc selector that caused AVX2/AVX512 paths to be skipped; fix POWER optimized rawmemchr function; fix stack content leak issue [CVE-2026-0915]
gnuaisFix displaying map in gnuaisgui
golang-github-containerd-stargz-snapshotterRebuild with updated containerd
golang-github-containers-buildahRebuild with updated containerd
golang-github-openshift-imagebuilderRebuild with updated containerd
gpsdFix out-of-bounds write issue [CVE-2025-67268]; fix integer underflow issue [CVE-2025-67269]
grub-efi-amd64-signedRemove NTFS and jfs from monolithic EFI image; update SBAT levels; set Protected: yes for -signed packages so they cannot easily be removed; backport upstream regression fixes; fix video/readers/jpeg: Do not permit duplicate SOF0 markers in JPEG [CVE-2024-45774]; fix commands/extcmd: Missing check for failed allocation [CVE-2024-45775]; fix commands/dump: The dump command is not in lockdown when secure boot is enabled [CVE-2025-1118]; fix integer overflow issues [CVE-2024-45776 CVE-2024-45777 CVE-2024-45778 CVE-2024-45779 CVE-2024-45780 CVE-2025-0677 CVE-2025-0678 CVE-2025-0684 CVE-2025-0685 CVE-2025-0690 CVE-2025-1125]; fix out-of-bounds write issues [CVE-2024-45781 CVE-2024-45782 CVE-2025-0624]; fix use-after-free issues [CVE-2024-45783 CVE-2025-0622]; fix buffer overflow issue [CVE-2025-0689]
grub-efi-arm64-signedRemove NTFS and jfs from monolithic EFI image; update SBAT levels; set Protected: yes for -signed packages so they cannot easily be removed; backport upstream regression fixes; fix video/readers/jpeg: Do not permit duplicate SOF0 markers in JPEG [CVE-2024-45774]; fix commands/extcmd: Missing check for failed allocation [CVE-2024-45775]; fix commands/dump: The dump command is not in lockdown when secure boot is enabled [CVE-2025-1118]; fix integer overflow issues [CVE-2024-45776 CVE-2024-45777 CVE-2024-45778 CVE-2024-45779 CVE-2024-45780 CVE-2025-0677 CVE-2025-0678 CVE-2025-0684 CVE-2025-0685 CVE-2025-0690 CVE-2025-1125]; fix out-of-bounds write issues [CVE-2024-45781 CVE-2024-45782 CVE-2025-0624]; fix use-after-free issues [CVE-2024-45783 CVE-2025-0622]; fix buffer overflow issue [CVE-2025-0689]
grub-efi-ia32-signedRemove NTFS and jfs from monolithic EFI image; update SBAT levels; set Protected: yes for -signed packages so they cannot easily be removed; backport upstream regression fixes; fix video/readers/jpeg: Do not permit duplicate SOF0 markers in JPEG [CVE-2024-45774]; fix commands/extcmd: Missing check for failed allocation [CVE-2024-45775]; fix commands/dump: The dump command is not in lockdown when secure boot is enabled [CVE-2025-1118]; fix integer overflow issues [CVE-2024-45776 CVE-2024-45777 CVE-2024-45778 CVE-2024-45779 CVE-2024-45780 CVE-2025-0677 CVE-2025-0678 CVE-2025-0684 CVE-2025-0685 CVE-2025-0690 CVE-2025-1125]; fix out-of-bounds write issues [CVE-2024-45781 CVE-2024-45782 CVE-2025-0624]; fix use-after-free issues [CVE-2024-45783 CVE-2025-0622]; fix buffer overflow issue [CVE-2025-0689]
grub2Remove NTFS and jfs from monolithic EFI image; update SBAT levels; set Protected: yes for -signed packages so they cannot easily be removed; backport upstream regression fixes; fix video/readers/jpeg: Do not permit duplicate SOF0 markers in JPEG [CVE-2024-45774]; fix commands/extcmd: Missing check for failed allocation [CVE-2024-45775]; fix commands/dump: The dump command is not in lockdown when secure boot is enabled [CVE-2025-1118]; fix integer overflow issues [CVE-2024-45776 CVE-2024-45777 CVE-2024-45778 CVE-2024-45779 CVE-2024-45780 CVE-2025-0677 CVE-2025-0678 CVE-2025-0684 CVE-2025-0685 CVE-2025-0690 CVE-2025-1125]; fix out-of-bounds write issues [CVE-2024-45781 CVE-2024-45782 CVE-2025-0624]; fix use-after-free issues [CVE-2024-45783 CVE-2025-0622]; fix buffer overflow issue [CVE-2025-0689]
gvfsUse control connection address for PASV data [CVE-2026-28295]; reject paths containing CR/LF characters [CVE-2026-28296]
kissfftFix integer overflow issues [CVE-2025-34297 CVE-2026-41445]
kpackageSkip unreliable build-time test
lemonldap-ngUpdate documentation to avoid using unsecured Nginx variable
libarchiveFix out-of-bounds read issues [CVE-2025-5918 CVE-2026-4424]; fix denial of service issues [CVE-2026-4111 CVE-2026-4426]; fix possible code execution issue [CVE-2026-5121]
libcap2Fix time of check / time of use issue [CVE-2026-4878]; rebuild with updated glibc
libexifFix integer underflow issues [CVE-2026-40386 CVE-2026-32775]; fix integer overflow issue [CVE-2026-40385]
libnet-cidr-lite-perlFix ACL bypass issues [CVE-2026-40198 CVE-2026-40199]
libpng1.6Fix heap buffer overflow issues [CVE-2026-22801 CVE-2026-22695]
libpodRebuild with updated containerd
libreofficeFix incomplete fix for CVE-2024-12426
libreoffice-texmathsAdd dependency on dvipng/dvisvgm
libuevFix buffer overrun issue [CVE-2022-48620]
libvncserverFix out-of-bounds read issue [CVE-2026-32853]; fix null pointer dereference issue [CVE-2026-32854]
libxml-security-javaFix private key disclosure issue [CVE-2023-44483]
libxsltFix deterministic generate-id() regression causing build failures in other packages
lxcFix authorisation bypass issue [CVE-2026-39402]
mapserverFix SQL injection issue [CVE-2025-59431]; fix buffer overflow issue [CVE-2026-33721]; fix heap-buffer-overflow and double-free issues in maplexer
modsecurity-crsFix rule bypass issue [CVE-2023-38199]; fix file extension blocking bypass issue [CVE-2026-33691]
mongo-c-driverFix insufficient validation issues [CVE-2025-14911 CVE-2026-6231]; fix denial of service issue [CVE-2026-4359]; fix buffer overflow issue [CVE-2026-6691]; improve handling of corrupt GridFS files
nginxFix buffer overflow issues [CVE-2026-27654 CVE-2026-27784 CVE-2026-32647]; fix session authentication issues [CVE-2026-27651 CVE-2026-28753]; fix OCSP result bypass issue [CVE-2026-28755]; use $host instead of $http_host
opensshFix possible code execution issues [CVE-2025-61984 CVE-2025-61985]; ensure scp does not unexpectedly make transferred files setuid or setgid [CVE-2026-35385]; fix command execution issue [CVE-2026-35386]; fix incomplete application of PubkeyAcceptedAlgorithms and HostbasedAcceptedAlgorithms with regard to ECDSA keys [CVE-2026-35387]; use connection multiplexing confirmation for proxy-mode multiplexing sessions [CVE-2026-35388]; fix handling of the authorized_keys principals option [CVE-2026-35414]; validate user and host names for ProxyJump/-J options passed via the command line
opensslNew upstream stable release
p7zipRebase onto newer 7zip version; fix integer underflow issue [CVE-2023-31102]; fix code execution issues [CVE-2023-40481 CVE-2025-11001 CVE-2025-11002]; fix denial of service issue [CVE-2024-11612]; fix null pointer dereference issue [CVE-2025-53817]; fix handling of symbolic links [CVE-2025-55188]; fix buffer overflow issue [CVE-2023-52168]; fix out-of-bounds read issues [CVE-2023-52169 CVE-2022-47069]
p7zip-rarRebase onto newer 7zip version; fix denial of service issue [CVE-2025-53816]
php-dompdfFix denial of service issue [CVE-2023-50262]
php-league-commonmarkFix cross site scripting issue [CVE-2025-46734]; fix validation bypass issues [CVE-2026-30838 CVE-2026-33347]
php-phpseclibFix denial of service issue [CVE-2024-27355]; fix variable time comparison issue [CVE-2026-40194]
php-phpseclib3Fix denial of service issue [CVE-2024-27355]; fix variable time comparison issue [CVE-2026-40194]
phpseclibFix denial of service issue [CVE-2024-27355]; fix variable time comparison issue [CVE-2026-40194]
plastimatchRemove non-free files
postgresql-15New upstream stable release; fix buffer overrun issue [CVE-2026-2006]
proftpd-dfsgFix denial of service issue [CVE-2024-57392]; fix SQL injection issue [CVE-2026-42167]; fix mod_radius: Message-Authenticator check always fails
pymupdfRebuild with updated mupdf
python-authlibFix algorithm confusion issue [CVE-2024-37568]; fix cross-site request forgery issue [CVE-2025-68158]; fix denial of service issues [CVE-2025-62706 CVE-2025-61920]; fix policy bypass issue [CVE-2025-59420]
python-djangoFix regular expression-based denial of service issue [CVE-2023-36053], denial of service issues [CVE-2024-38875 CVE-2024-39614 CVE-2024-41990 CVE-2024-41991], user enumeration issue [CVE-2024-39329], directory traversal issue [CVE-2024-39330], excessive memory consumption issue [CVE-2024-41989], SQL injection issue [CVE-2024-42005]
python-ldapFix insufficient escaping issue [CVE-2025-61911]; fix denial of service issue [CVE-2025-61912]
python3.11Fix header injection issues [CVE-2025-11468 CVE-2025-15282 CVE-2026-0672 CVE-2026-0865 CVE-2026-1299]; fix denial of service issues [CVE-2025-12084 CVE-2025-13836 CVE-2025-13837 CVE-2025-6069 CVE-2025-6075 CVE-2025-8194]; fix insufficient validation in zipFile [CVE-2025-8291]; fix use-after-free issue [CVE-2025-4516]
qemuRebuild with updated glibc, glib2.0, gnutls28
request-tracker5Fix builds of CKEditor when firefox is >= 148
sashRebuild with updated glibc
sedFix time of check / time of use issue [CVE-2026-5958]
sioyekRebuild with updated mupdf
skeemaRebuild with updated containerd
snapdRebuild with updated libcap2
sudoFix exec_mailer permissions checks [CVE-2026-35535]
superminRebuild with updated glibc
swupdateFix denial of service issue [CVE-2026-28525]
systemdFix assert and freeze [CVE-2026-29111]; fix code execution issues [CVE-2026-40225 CVE-2026-4105]; fix nspawn escape-to-host issue [CVE-2026-40226]
taglibFix segmentation violation issue [CVE-2023-47466]
tpm2-pkcs11Fix NULL pointer dereference during database migration
tripwireRebuild with updated glibc
tzdataNew upstream release; update data for British Columbia
user-mode-linuxRebuild with updated linux
vipsFix buffer overflow issues [CVE-2026-2913 CVE-2026-3147 CVE-2026-3281]; fix memory corruption issue [CVE-2026-3145]; fix null pointer dereference issue [CVE-2026-3146]; fix out of bound read issues [CVE-2026-3282 CVE-2026-3283]; fix integer overflow issue [CVE-2026-3284]
wireless-regdbNew upstream stable release; update regulatory information for several countries
wiresharkFix denial of service issues [CVE-2024-11596 CVE-2024-9781 CVE-2025-11626 CVE-2025-13499 CVE-2025-13945 CVE-2025-13946 CVE-2025-1492 CVE-2025-5601 CVE-2025-9817 CVE-2026-0960]
xorg-serverFix buffer re-use issue [CVE-2026-33999]; fix / improve bounds checking [CVE-2026-34000 CVE-2026-34003]; fix use after free issue [CVE-2026-34001]; fix out-of-bounds read issue [CVE-2026-34002]
zshRebuild with updated libcap2, glibc
zvbiFix uninitialised pointer issue [CVE-2025-2173]; fix integer overflow issues [CVE-2025-2174 CVE-2025-2175 CVE-2025-2176 CVE-2025-2177]

Security Updates

This revision adds the following security updates to the oldstable release. The Security Team has already released an advisory for each of these updates:

Advisory IDPackage
DSA-6003 firefox-esr
DSA-6025 firefox-esr
DSA-6054 firefox-esr
DSA-6078 firefox-esr
DSA-6093 gimp
DSA-6094 libsodium
DSA-6096 vlc
DSA-6097 chromium
DSA-6098 net-snmp
DSA-6100 chromium
DSA-6101 firefox-esr
DSA-6102 python-urllib3
DSA-6103 thunderbird
DSA-6105 modsecurity-crs
DSA-6106 inetutils
DSA-6107 bind9
DSA-6108 chromium
DSA-6110 openjdk-17
DSA-6111 imagemagick
DSA-6113 openssl
DSA-6114 pyasn1
DSA-6115 gimp
DSA-6116 chromium
DSA-6118 thunderbird
DSA-6120 tomcat10
DSA-6122 chromium
DSA-6123 xrdp
DSA-6125 usbmuxd
DSA-6127 linux-signed-amd64
DSA-6127 linux-signed-arm64
DSA-6127 linux-signed-i386
DSA-6127 linux
DSA-6128 shaarli
DSA-6129 munge
DSA-6131 nginx
DSA-6132 postgresql-15
DSA-6135 chromium
DSA-6136 python-django-storages
DSA-6136 python-django
DSA-6137 roundcube
DSA-6138 libpng1.6
DSA-6139 gimp
DSA-6140 gnutls28
DSA-6142 gegl
DSA-6143 libvpx
DSA-6145 nova
DSA-6146 chromium
DSA-6148 firefox-esr
DSA-6149 nss
DSA-6150 python-django
DSA-6151 chromium
DSA-6152 thunderbird
DSA-6153 lxd
DSA-6154 php8.2
DSA-6156 gimp
DSA-6157 chromium
DSA-6159 imagemagick
DSA-6160 netty
DSA-6163 linux-signed-amd64
DSA-6163 linux-signed-arm64
DSA-6163 linux-signed-i386
DSA-6163 linux
DSA-6164 chromium
DSA-6165 chromium
DSA-6167 gst-plugins-base1.0
DSA-6170 snapd
DSA-6171 chromium
DSA-6172 webkit2gtk
DSA-6173 freeciv
DSA-6175 libyaml-syck-perl
DSA-6176 strongswan
DSA-6177 chromium
DSA-6178 firefox-esr
DSA-6179 thunderbird
DSA-6180 ruby-rack
DSA-6181 bind9
DSA-6182 libxml-parser-perl
DSA-6185 phpseclib
DSA-6186 php-phpseclib
DSA-6187 php-phpseclib3
DSA-6188 lxd
DSA-6189 libpng1.6
DSA-6190 gst-plugins-bad1.0
DSA-6191 gst-plugins-ugly1.0
DSA-6192 chromium
DSA-6193 inetutils
DSA-6194 pyasn1
DSA-6195 python-tornado
DSA-6196 roundcube
DSA-6197 dovecot
DSA-6199 trafficserver
DSA-6200 tor
DSA-6201 openssl
DSA-6202 firefox-esr
DSA-6203 tiff
DSA-6204 openssh
DSA-6205 chromium
DSA-6206 gdk-pixbuf
DSA-6208 mediawiki
DSA-6210 imagemagick
DSA-6211 thunderbird
DSA-6213 lxd
DSA-6214 chromium
DSA-6215 gimp
DSA-6216 opam
DSA-6218 mupdf
DSA-6220 simpleeval
DSA-6221 ntfs-3g
DSA-6222 ngtcp2
DSA-6223 flatpak
DSA-6224 xdg-dbus-proxy
DSA-6225 firefox-esr
DSA-6226 packagekit
DSA-6227 strongswan
DSA-6229 thunderbird
DSA-6230 chromium
DSA-6236 firefox-esr
DSA-6237 jtreg7
DSA-6237 openjdk-17
DSA-6239 chromium
DSA-6242 thunderbird
DSA-6243 linux-signed-amd64
DSA-6243 linux-signed-arm64
DSA-6243 linux-signed-i386
DSA-6243 linux
DSA-6245 imagemagick
DSA-6247 lxd
DSA-6248 apache2
DSA-6249 wireshark
DSA-6251 libreoffice
DSA-6252 prosody
DSA-6254 firefox-esr
DSA-6255 php8.2
DSA-6257 postorius
DSA-6258 linux-signed-amd64
DSA-6258 linux-signed-arm64
DSA-6258 linux-signed-i386
DSA-6258 linux
DSA-6259 pyjwt
DSA-6260 tor
DSA-6261 corosync
DSA-6262 lcms2
DSA-6263 libpng1.6
DSA-6264 dnsmasq
DSA-6265 exim4

Removed packages

The following packages were removed due to circumstances beyond our control:

PackageReason
suricataUnsupportable; possible security issues; maintained via backports
zulucryptSecurity issues; unmaintained

Keep systems patched and happy.