Debian 10694 Published by

Debian 13 Trixie has released its first point update, focusing on addressing security issues and resolving critical problems. The update includes various bug fixes and security updates for packages such as imagemagick, libcoap3, and postgresql-17, among others. Existing installations can be upgraded by pointing the package management system at one of Debian's many HTTP mirrors, while new installation images will soon be available at regular locations. 



Debian GNU/Linux 13.1 released: The first Point Release of Trixie

The Debian project released the first update to its stable distribution, Debian 13 (codename Trixie). This point release primarily focuses on addressing security issues and resolving critical problems. It is essential to note that this point release does not represent a new version of Debian 13 but rather an update to some of the included packages.

Debian13

Update Procedure

Existing installations can be upgraded by pointing the package management system at one of Debian's many HTTP mirrors. A comprehensive list of mirrors is available on the official Debian website: https://www.debian.org/mirror/list 

New installation images will soon be available at the regular locations.

Important Bug Fixes and Security Updates

The stable update includes several crucial corrections to various packages, including:

  1. auto-apt-proxy: Checks explicitly configured proxies before network gateway.
  2. firebird3.0: Fixes null pointer dereference in XDR message parsing (CVE-2025-54989).
  3. imagemagick: Security fixes for heap buffer overflow, infinite loop, memory leak, and stack overflow issues (CVE-2025-53014, CVE-2025-53015, CVE-2025-53019, CVE-2025-53101, CVE-2025-43965, and CVE-2025-46393).
  4. libcoap3: Fixes buffer overflow and integer overflow issues (CVE-2024-0962 and CVE-2024-31031).
  5. postgresql-17: Tightens security checks in planner estimation functions and prevents pg_dump scripts from being used to attack the user running the restore (CVE-2025-8713, CVE-2025-8714, and CVE-2025-8715).
Updated packages in detail

This stable update introduces several significant corrections to the following packages:

PackageReason
auto-apt-proxyCheck explicitly configured proxies before network gateway
base-filesUpdate for the point release
courierFix courier-webmin
debian-installerIncrease Linux kernel ABI to 6.12.43+deb13; rebuild against proposed-updates; add a workaround for a GRUB graphics initialisation bug
debian-installer-netboot-imagesRebuild against proposed-updates
desktop-baseFix placement of plymouth prompts in multi-monitor setups
devscriptsUpdate suite and codename mappings
dpdkNew upstream point release
ethtoolnetlink: fix print_string when the value is NULL
firebird3.0Fix null pointer dereference in XDR message parsing [CVE-2025-54989]
flvstreamerStop installing rtmpsrv and rtmpsuck, avoiding file conflict with the rtmpdump package
galera-4New upstream stable release
gitNew upstream bug-fix release; fix arbitrary file write issues [CVE-2025-27613 CVE-2025-46835]; fix code execution issues [CVE-2025-27614 CVE-2025-48384]; fix protocol injection issue, possibly leading to arbitrary code execution [CVE-2025-48385]
glib2.0New upstream bugfix release; fix a corner case when upgrading from bookworm
gnome-control-centerFix a UI issue and an error display issue; translation updates
gnome-online-accountsNew upstream bug-fix release; update translations
gnome-shellNew upstream bugfix release
golang-github-gin-contrib-corsFix mishandling of wildcards [CVE-2019-25211]
gssdpNew upstream bug-fix release; fix issues with Since: and Deprecated: declarations in documentation
imagemagickSecurity fixes: heap buffer overflow in the InterpretImageFilename function [CVE-2025-53014]; infinite loop when writing during a specific XMP file conversion command [CVE-2025-53015]; memory leak in the magick stream command [CVE-2025-53019]; stack overflow through vsnprintf() [CVE-2025-53101]; use-after-free when SetQuantumFormat is used [CVE-2025-43965]; in multispectral MIFF image processing, packet_size mishandling [CVE-2025-46393]
init-system-helpersFix handling of os-release diversions from live-build, ensuring they don't exist in non-live systems
installation-guideEnable Hungarian and Ukrainian translations; fix boot-dev-select-arm64 and armhf-armmp-supported-platforms hyperlinks
iperf3Fix buffer overflow issue [CVE-2025-54349]; fix assertion failure [CVE-2025-54350]
kamailioRelax OpenSSL version check to only match against major version
libadwaita-1New upstream bugfix release
libcgi-simple-perlFix HTTP response splitting issue [CVE-2025-40927]
libcoap3Fix buffer overflow issue [CVE-2024-0962]; fix integer overflow issue [CVE-2024-31031]
libreofficeAdd EUR support for Bulgaria; fix installation of Impress sound effects; fix playing of videos in Impress under Qt6
librepoNew upstream bug-fix release, fixing support for DNF5; improve handling of SELinux in the Debian packaging
linuxNew upstream stable release
linux-signed-amd64New upstream stable release
linux-signed-arm64New upstream stable release
live-bootFix handling of os-release diversions from live-build, ensuring they don't exist in non-live systems
live-buildFix handling of os-release diversions, ensuring they don't exist in non-live systems
mameFix translation building
mariadbNew upstream stable release
mate-sensors-appletFix crash at startup
mmdebstrapSupport numeric UID in /etc/subgid and /etc/subuid
modemmanagerFix support for Fibocom FM350-GL
mozjs128New upstream stable release; fix uninitialised memory issue [CVE-2025-9181], memory safety issues [CVE-2025-9185]
network-manager-openvpnNew upstream stable release; fix multi-factor authentication in combination with non-ASCII characters
nginxFix potential information leak in ngx_mail_smtp_module [CVE-2025-53859]
node-tmpFix arbitrary file write issue [CVE-2025-54798]
open-iscsiEnsure /var/lib exists in initramfs
openjpeg2Fix out-of-bounds write issue [CVE-2025-54874]
orcaAdd dependencies on python3-setproctitle and python3-psutil
orphan-sysvinit-scriptsFix installation of mdadm scripts
pcre2New upstream stable release; fix potential information disclosure issue [CVE-2025-58050]
postfixNew upstream stable release; fix copying of files to chroot
postgresql-17New upstream stable release; tighten security checks in planner estimation functions [CVE-2025-8713]; prevent pg_dump scripts from being used to attack the user running the restore [CVE-2025-8714]; convert newlines to spaces in names included in comments in pg_dump output [CVE-2025-8715]
ptyxisNew upstream bugfix release
pyrafEnsure compatibility with Python 3.13
qemuNew upstream bugfix release
rabbitmq-serverShow proper plugin version numbers
remindFix buffer overflow in DUMPVARS
renpyFix font symlinks
resource-agentsHandle cases where more than one route for an IP address exists
rkwardRestore compatibility with R 4.5
sambaNew upstream bugfix release
sbuildSupport UID in /etc/sub(u|g)id; fix build path permissions when building as root; always append newline in binNMU changelog; allow empty BUILD_PATH in command line options
shaarliFix cross site scripting issue [CVE-2025-55291]
sound-theme-freedesktopLink front-center sample to audio-channel-mono
strongswanFix OpenSSL 3.5.1 support
systemdNew upstream stable release
systemd-boot-efi-amd64-signedNew upstream stable release
systemd-boot-efi-arm64-signedNew upstream stable release
thunarFix prompt before permanently deleting files
timescaledbDisable test that fails with Postgresql 17.6
transmissionFix GTK app crash when LANG=fr
tzdataConfirm leap second status for 2025
wolfsslAvoid weak and predictable random numbers [CVE-2025-7394]

This update incorporates essential security enhancements to the stable release:

Advisory IDPackage
DSA-5975 linux-signed-amd64
DSA-5975 linux-signed-arm64
DSA-5975 linux
DSA-5976 chromium
DSA-5977 aide
DSA-5978 webkit2gtk
DSA-5979 libxslt
DSA-5980 firefox-esr
DSA-5981 chromium
DSA-5983 qemu
DSA-5984 thunderbird
DSA-5986 node-cipher-base
DSA-5988 chromium
DSA-5989 udisks2
DSA-5990 libxml2
DSA-5992 firebird4.0

The following packages were removed:

PackageReason
guixUnsupportable; security issues
Debian Installer Update

The installer has been updated to include the fixes incorporated into stable by the point release.

URLs

For further information, please refer to the following links: