Debian 10842 Published by

Debian released multiple security advisories addressing critical vulnerabilities within several key software packages on Linux systems. GStreamer plugins suffered from integer overflows that could lead to code execution if a user opens a malicious media file on their system. Other affected tools like Incus and nodejs face risks involving side channel attacks while PHP libraries are susceptible to timing attacks on their cryptographic functions. Users running Debian stable distributions should apply the recommended updates immediately to prevent potential system compromise or data loss from these exploits.

Debian GNU/Linux 9 (Stretch) and 10 (Buster) Extended:
ELA-1669-1 gst-plugins-base1.0 security update
ELA-1670-1 gst-plugins-ugly1.0 security update

Debian GNU/Linux 11 (Bullseye) LTS:
[DLA 4514-1] gst-plugins-base1.0 security update
[DLA 4516-1] gst-plugins-ugly1.0 security update

Debian GNU/Linux 12 (Stretch) and 13 (Trixie):
[DSA 6187-1] php-phpseclib3 security update
[DSA 6186-1] php-phpseclib security update
[DSA 6185-1] phpseclib security update

Debian GNU/Linux 13 (Trixie):
[DSA 6184-1] incus security update
[DSA 6183-1] nodejs security update



[SECURITY] [DLA 4514-1] gst-plugins-base1.0 security update


- -----------------------------------------------------------------------
Debian LTS Advisory DLA-4514-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Utkarsh Gupta
March 29, 2026 https://wiki.debian.org/LTS
- -----------------------------------------------------------------------

Package : gst-plugins-base1.0
Version : 1.18.4-2+deb11u5
CVE ID : CVE-2026-2921

An integer overflow was discovered in the RIFF parser of the GStreamer
media framework, which may result in denial of service or potentially the
execution of arbitrary code if a malformed media file is opened.

For Debian 11 bullseye, this problem has been fixed in version
1.18.4-2+deb11u5.

We recommend that you upgrade your gst-plugins-base1.0 packages.

For the detailed security status of gst-plugins-base1.0 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/gst-plugins-base1.0

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



ELA-1669-1 gst-plugins-base1.0 security update


Package : gst-plugins-base1.0
Version : 1.10.4-1+deb9u7 (stretch), 1.14.4-2+deb10u6 (buster)

Related CVEs :
CVE-2026-2921

An integer overflow was discovered in the RIFF parser of the GStreamer
media framework, which may result in denial of service or potentially the
execution of arbitrary code if a malformed media file is opened.


ELA-1669-1 gst-plugins-base1.0 security update



[SECURITY] [DSA 6184-1] incus security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-6184-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
March 29, 2026 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : incus
CVE ID : CVE-2026-28384 CVE-2026-33542 CVE-2026-33743

Multiple security issues were discovered in Incus, a system container
and virtual machine manager, which could result in denial of service
or the execution of arbitrary commands.

For the stable distribution (trixie), these problems have been fixed in
version 6.0.4-2+deb13u5.

We recommend that you upgrade your incus packages.

For the detailed security status of incus please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/incus

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/


[SECURITY] [DSA 6183-1] nodejs security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-6183-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
March 29, 2026 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : nodejs
CVE ID : CVE-2026-21637 CVE-2026-21710 CVE-2026-21713 CVE-2026-21714
CVE-2026-21715 CVE-2026-21716 CVE-2026-21717

Multiple vulnerabilities were discovered in Node.js, which could result
in denial of service, side channel attacks or information disclosure.

For the stable distribution (trixie), these problems have been fixed in
version 20.19.2+dfsg-1+deb13u2.

We recommend that you upgrade your nodejs packages.

For the detailed security status of nodejs please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/nodejs

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/


[SECURITY] [DLA 4516-1] gst-plugins-ugly1.0 security update


- -----------------------------------------------------------------------
Debian LTS Advisory DLA-4516-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Utkarsh Gupta
March 30, 2026 https://wiki.debian.org/LTS
- -----------------------------------------------------------------------

Package : gst-plugins-ugly1.0
Version : 1.18.4-2+deb11u2
CVE ID : CVE-2026-2920 CVE-2026-2922

Two vulnerabilities were discovered in gst-plugins-ugly1.0, a set of
GStreamer plugins from the "ugly" set.

CVE-2026-2920

The ASF demuxer did not validate the number of streams against
the size of its static streams array. A crafted ASF file with
more than 32 streams could cause a heap-based buffer overflow
and potentially allow code execution.

CVE-2026-2922

The RealMedia demuxer checked for too many video fragments after
writing to the fragment storage, allowing an out-of-bounds write.
Additionally, an integer overflow in the fragment size check could
bypass the available data validation.

For Debian 11 bullseye, these problems have been fixed in version
1.18.4-2+deb11u2.

We recommend that you upgrade your gst-plugins-ugly1.0 packages.

For the detailed security status of gst-plugins-ugly1.0 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/gst-plugins-ugly1.0

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



[SECURITY] [DSA 6187-1] php-phpseclib3 security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-6187-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
March 29, 2026 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : php-phpseclib3
CVE ID : CVE-2026-32935

It was discovered that the AES-CBC implementation in the PHP Secure
Communications Library was susceptible to a padding oracle timing attack.

For the oldstable distribution (bookworm), these problems have been fixed
in version 3.0.19-1+deb12u4. This update also fixes CVE-2023-52892.

For the stable distribution (trixie), these problems have been fixed in
version 3.0.43-2+deb13u1.

We recommend that you upgrade your php-phpseclib3 packages.

For the detailed security status of php-phpseclib3 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/php-phpseclib3

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/


[SECURITY] [DSA 6186-1] php-phpseclib security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-6186-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
March 29, 2026 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : php-phpseclib
CVE ID : CVE-2026-32935

It was discovered that the AES-CBC implementation in the PHP Secure
Communications Library was susceptible to a padding oracle timing attack.

For the oldstable distribution (bookworm), these problems have been fixed
in version 2.0.42-1+deb12u3. This update also fixes CVE-2023-52892.

For the stable distribution (trixie), these problems have been fixed in
version 2.0.48-3+deb13u1.

We recommend that you upgrade your php-phpseclib packages.

For the detailed security status of php-phpseclib please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/php-phpseclib

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/


[SECURITY] [DSA 6185-1] phpseclib security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-6185-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
March 29, 2026 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : phpseclib
CVE ID : CVE-2026-32935

It was discovered that the AES-CBC implementation in the PHP Secure
Communications Library was susceptible to a padding oracle timing attack.

For the oldstable distribution (bookworm), these problems have been fixed
in version 1.0.20-1+deb12u3. This update also fixes CVE-2023-52892.

For the stable distribution (trixie), these problems have been fixed in
version 1.0.23-6+deb13u1.

We recommend that you upgrade your phpseclib packages.

For the detailed security status of phpseclib please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/phpseclib

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/


ELA-1670-1 gst-plugins-ugly1.0 security update


Package : gst-plugins-ugly1.0
Version : 1.10.4-1+deb9u3 (stretch), 1.14.4-1+deb10u3 (buster)

Related CVEs :
CVE-2026-2920
CVE-2026-2922

Two vulnerabilities were discovered in gst-plugins-ugly1.0, a set of
GStreamer plugins from the “ugly” set.
CVE-2026-2920
The ASF demuxer did not validate the number of streams against
the size of its static streams array. A crafted ASF file with
more than 32 streams could cause a heap-based buffer overflow
and potentially allow code execution.

CVE-2026-2922
The RealMedia demuxer checked for too many video fragments after
writing to the fragment storage, allowing an out-of-bounds write.
Additionally, an integer overflow in the fragment size check could
bypass the available data validation.


ELA-1670-1 gst-plugins-ugly1.0 security update