Debian GNU/Linux 9 (Stretch) and 10 (Buster) Extended LTS:
ELA-1593-1 libsoup2.4 security update
Debian GNU/Linux 11 (Bullseye) LTS:
[DLA 4402-1] libsndfile security update
[DLA 4401-1] firefox-esr security update
[SECURITY] [DLA 4402-1] libsndfile security update
- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4402-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Bastien Roucari??s
December 11, 2025 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : libsndfile
Version : 1.0.31-2+deb11u2
CVE ID : CVE-2021-4156
Debian Bug : 1014713
An out-of-bounds read flaw was found in libsndfile's
FLAC codec functionality. An attacker who is able to
submit a specially crafted file (via tricking a user
to open or otherwise) to an application linked with
libsndfile and using the FLAC codec, could trigger
an out-of-bounds read that would most likely cause
a crash but could potentially leak memory information
that could be used in further exploitation of other flaws.
For Debian 11 bullseye, this problem has been fixed in version
1.0.31-2+deb11u2.
We recommend that you upgrade your libsndfile packages.
For the detailed security status of libsndfile please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libsndfile
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
[SECURITY] [DLA 4401-1] firefox-esr security update
- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4401-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Emilio Pozuelo Monfort
December 11, 2025 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : firefox-esr
Version : 140.6.0esr-1~deb11u1
CVE ID : CVE-2025-14321 CVE-2025-14322 CVE-2025-14323 CVE-2025-14324
CVE-2025-14325 CVE-2025-14328 CVE-2025-14329 CVE-2025-14330
CVE-2025-14331 CVE-2025-14333
Multiple security issues have been found in the Mozilla Firefox web
browser, which could potentially result in the execution of arbitrary
code, sandbox escape, same-origin policy bypass or privilege escalation.
For Debian 11 bullseye, these problems have been fixed in version
140.6.0esr-1~deb11u1.
We recommend that you upgrade your firefox-esr packages.
For the detailed security status of firefox-esr please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/firefox-esr
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
ELA-1593-1 libsoup2.4 security update
Package : libsoup2.4
Version : 2.56.0-2+deb9u5 (stretch), 2.64.2-2+deb10u3 (buster)
Related CVEs :
CVE-2025-4476
CVE-2025-4945
CVE-2025-4948
CVE-2025-4969
Several vulnerabilities have been found in libsoup2.4.
libsoup is an HTTP client/server library for GNOME. It uses GObjects and the
glib main loop, to integrate well with GNOME applications.
CVE-2025-4945: integer overflow in cookie parsing.
A flaw was found in the cookie parsing logic of the libsoup HTTP
library, used in GNOME applications and other software. The
vulnerability arises when processing the expiration date of cookies,
where a specially crafted value can trigger an integer overflow. This
may result in undefined behavior, allowing an attacker to bypass cookie
expiration logic, causing persistent or unintended cookie behavior. The
issue stems from improper validation of large integer inputs during date
arithmetic operations within the cookie parsing routines.
CVE-2025-4476: crash in soup_auth_digest_get_protection_space.
A denial-of-service vulnerability has been identified in the libsoup
HTTP client library. This flaw can be triggered when a libsoup client
receives a 401 (Unauthorized) HTTP response containing a specifically
crafted domain parameter within the WWW-Authenticate header. Processing
this malformed header can lead to a crash of the client application
using libsoup. An attacker could exploit this by setting up a malicious
HTTP server. If a user's application using the vulnerable libsoup
library connects to this malicious server, it could result in a
denial-of-service. Successful exploitation requires tricking a user's
client application into connecting to the attacker's malicious server.
CVE-2025-4948: verify boundary limits for multipart body.
A flaw was found in the soup_multipart_new_from_message() function of
the libsoup HTTP library, which is commonly used by GNOME and other
applications to handle web communications. The issue occurs when the
library processes specially crafted multipart messages. Due to improper
validation, an internal calculation can go wrong, leading to an integer
underflow. This can cause the program to access invalid memory and
crash. As a result, any application or server using libsoup could be
forced to exit unexpectedly, creating a denial-of-service (DoS) risk.
CVE-2025-4969: verify array bounds before accessing.
A vulnerability was found in the libsoup package. This flaw stems from
its failure to correctly verify the termination of multipart HTTP
messages. This can allow a remote attacker to send a specially crafted
multipart HTTP body, causing the libsoup-consuming server to read beyond
its allocated memory boundaries (out-of-bounds read).ELA-1593-1 libsoup2.4 security update