Debian 10790 Published by

Debian has released several security updates, including patches for GnuTLS, which fixes a denial-of-service vulnerability caused by processing specially crafted certificates containing name constraints. Additionally, Debian has updated its GIMP packages to fix multiple vulnerabilities that could lead to denial-of-service or arbitrary code execution if malformed PSD, PSP, or ICO files are opened. The Linux kernel package has also been updated to address numerous vulnerabilities that may lead to privilege escalation, denial of service, or information leaks. Users are recommended to upgrade their Debian packages to the latest versions to ensure they have the necessary security patches installed.

[DSA 6140-1] gnutls28 security update
[DSA 6139-1] gimp security update
[DSA 6141-1] linux security update
[DLA 4483-1] gimp security update




[SECURITY] [DSA 6140-1] gnutls28 security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-6140-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
February 18, 2026 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : gnutls28
CVE ID : CVE-2025-14831

Tim Scheckenbach reported a flaw in GnuTLS, a library implementing the
TLS and SSL protocols. Processing of specially crafted certificates
containing a large number of name constraints may result in denial of
service (resource exhaustion).

For the oldstable distribution (bookworm), this problem has been fixed
in version 3.7.9-2+deb12u6. This update also includes a fix for
CVE-2025-9820.

For the stable distribution (trixie), this problem has been fixed in
version 3.8.9-3+deb13u2.

We recommend that you upgrade your gnutls28 packages.

For the detailed security status of gnutls28 please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/gnutls28

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/


[SECURITY] [DSA 6139-1] gimp security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-6139-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
February 18, 2026 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : gimp
CVE ID : CVE-2026-2239 CVE-2026-2271 CVE-2026-2272
Debian Bug : 1127838 1127841 1127842

Several vulnerabilities were discovered in GIMP, the GNU Image
Manipulation Program, which could result in denial of service or
potentially the execution of arbitrary code if malformed PSD, PSP or ICO
files are opened.

For the oldstable distribution (bookworm), these problems have been fixed
in version 2.10.34-1+deb12u8.

For the stable distribution (trixie), these problems have been fixed in
version 3.0.4-3+deb13u6.

We recommend that you upgrade your gimp packages.

For the detailed security status of gimp please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/gimp

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/


[SECURITY] [DSA 6141-1] linux security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-6141-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
February 18, 2026 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : linux
CVE ID : CVE-2025-40082 CVE-2025-68823 CVE-2025-71203 CVE-2025-71204
CVE-2025-71220 CVE-2025-71222 CVE-2025-71223 CVE-2025-71224
CVE-2025-71225 CVE-2025-71228 CVE-2025-71229 CVE-2025-71231
CVE-2025-71232 CVE-2025-71233 CVE-2025-71234 CVE-2025-71235
CVE-2025-71236 CVE-2025-71237 CVE-2026-23111 CVE-2026-23112
CVE-2026-23169 CVE-2026-23176 CVE-2026-23177 CVE-2026-23178
CVE-2026-23179 CVE-2026-23180 CVE-2026-23182 CVE-2026-23187
CVE-2026-23188 CVE-2026-23189 CVE-2026-23190 CVE-2026-23191
CVE-2026-23193 CVE-2026-23198 CVE-2026-23199 CVE-2026-23200
CVE-2026-23201 CVE-2026-23202 CVE-2026-23204 CVE-2026-23205
CVE-2026-23206 CVE-2026-23209 CVE-2026-23213 CVE-2026-23214
CVE-2026-23215 CVE-2026-23216 CVE-2026-23219 CVE-2026-23220
CVE-2026-23222 CVE-2026-23223 CVE-2026-23224 CVE-2026-23228
CVE-2026-23229 CVE-2026-23230
Debian Bug : 1125405 1127597

Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.

For the stable distribution (trixie), these problems have been fixed in
version 6.12.73-1.

We recommend that you upgrade your linux packages.

For the detailed security status of linux please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/linux

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/


[SECURITY] [DLA 4483-1] gimp security update


- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4483-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Thorsten Alteholz
February 18, 2026 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : gimp
Version : 2.10.22-4+deb11u6
CVE ID : CVE-2025-15059 CVE-2026-2239 CVE-2026-2271 CVE-2026-2272

Several vulnerabilities were discovered in GIMP, the GNU Image
Manipulation Program, which could result in denial of service or
potentially the execution of arbitrary code if malformed PSD, PSP or ICO
files are opened.

For Debian 11 bullseye, these problems have been fixed in version
2.10.22-4+deb11u6.

We recommend that you upgrade your gimp packages.

For the detailed security status of gimp please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/gimp

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS