Debian 10694 Published by

Debian GNU/Linux has received several security updates, including redis, libcommons-lang-java, node-form-data, and sope:

Debian GNU/Linux 11 (Bullseye) LTS:
[DLA 4262-1] libcommons-lang-java security update
[DLA 4261-1] node-form-data security update

Debian GNU/Linux 12 (Bookworm):
[DSA 5969-1] redis security update
[DSA 5970-1] sope security update




[SECURITY] [DSA 5969-1] redis security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-5969-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
July 31, 2025 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : redis
CVE ID : CVE-2025-27151 CVE-2025-32023 CVE-2025-48367
Debian Bug : 1106822 1108975 1108981

Several security issues were discovered in Redis, a persistent key-value
database, which could result in the execution of arbitrary code or
denial of service.

For the stable distribution (bookworm), these problems have been fixed in
version 5:7.0.15-1~deb12u5.

We recommend that you upgrade your redis packages.

For the detailed security status of redis please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/redis

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/


[SECURITY] [DLA 4262-1] libcommons-lang-java security update


-------------------------------------------------------------------------
Debian LTS Advisory DLA-4262-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Daniel Leidert
August 01, 2025 https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package : libcommons-lang-java
Version : 2.6-9+deb11u1
CVE ID : CVE-2025-48924
Debian Bug : 1109126

A vulnerability has been discovered in libcommons-lang-java, a set of
Java classes that provide helper methods for standard Java classes.

CVE-2025-48924

An uncontrolled recursion vulnerability was discovered in
ClassUtils.getClass() that could lead to a StackOverflowError on
very long inputs.

For Debian 11 bullseye, this problem has been fixed in version
2.6-9+deb11u1.

We recommend that you upgrade your libcommons-lang-java packages.

For the detailed security status of libcommons-lang-java please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libcommons-lang-java

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



[SECURITY] [DLA 4261-1] node-form-data security update


- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4261-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Chris Lamb
July 31, 2025 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : node-form-data
Version : 3.0.0-2+deb11u1
CVE ID : CVE-2025-7783
Debian Bug : 1109551

It was discovered that there was a potential HTTP Parameter Pollution
(HPP) issue in node-form-data, a tool to create multipart/form-data
streams module in Node.js applications.

For Debian 11 bullseye, this problem has been fixed in version
3.0.0-2+deb11u1.

We recommend that you upgrade your node-form-data packages.

For the detailed security status of node-form-data please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/node-form-data

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



[SECURITY] [DSA 5970-1] sope security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-5970-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
July 31, 2025 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : sope
CVE ID : CVE-2025-53603
Debian Bug : 1108798

Stefan Buehler discovered a flaw in sope, the set of Objective-C
frameworks powering SOGo, which may result in denial of service via a
specially crafted POST request.

For the stable distribution (bookworm), this problem has been fixed in
version 5.8.0-1+deb12u1.

We recommend that you upgrade your sope packages.

For the detailed security status of sope please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/sope

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/