Debian GNU/Linux 9 (Stretch) and 10 (Buster) Extended LTS:
ELA-1644-1 linux-5.10 security update
ELA-1643-1 linux-6.1 security update
Debian GNU/Linux 10 (Buster) Extended LTS:
ELA-1645-1 clamav new upstream version
Debian GNU/Linux 13 (Trixie):
[DSA 6134-1] pdns-recursor security update
ELA-1645-1 clamav new upstream version
Package : clamav
Version : 1.4.3+dfsg-1~deb10u1 (buster)
The 1.0 version of ClamAV, an anti-virus utility for Unix, had recently
been discontinued upstream, and was set to no longer accept signature
updates on November 28, 2026. This update brings ClamAV 1.4 to buster,
extending the upstream support.ELA-1645-1 clamav new upstream version
ELA-1644-1 linux-5.10 security update
Package : linux-5.10
Version : 5.10.249-1~deb9u1 (stretch), 5.10.249-1~deb10u1 (buster)
Related CVEs :
CVE-2022-48744
CVE-2022-49168
CVE-2022-49465
CVE-2022-49711
CVE-2022-49743
CVE-2023-52975
CVE-2023-54207
CVE-2023-54321
CVE-2024-36903
CVE-2024-36927
CVE-2025-22022
CVE-2025-22121
CVE-2025-37830
CVE-2025-38022
CVE-2025-38119
CVE-2025-38556
CVE-2025-38591
CVE-2025-39702
CVE-2025-40110
CVE-2025-40215
CVE-2025-68211
CVE-2025-68255
CVE-2025-68257
CVE-2025-68258
CVE-2025-68261
CVE-2025-68264
CVE-2025-68266
CVE-2025-68282
CVE-2025-68325
CVE-2025-68332
CVE-2025-68336
CVE-2025-68337
CVE-2025-68344
CVE-2025-68346
CVE-2025-68349
CVE-2025-68354
CVE-2025-68362
CVE-2025-68364
CVE-2025-68366
CVE-2025-68367
CVE-2025-68372
CVE-2025-68724
CVE-2025-68725
CVE-2025-68733
CVE-2025-68740
CVE-2025-68757
CVE-2025-68758
CVE-2025-68759
CVE-2025-68764
CVE-2025-68767
CVE-2025-68769
CVE-2025-68771
CVE-2025-68773
CVE-2025-68774
CVE-2025-68776
CVE-2025-68777
CVE-2025-68782
CVE-2025-68783
CVE-2025-68785
CVE-2025-68787
CVE-2025-68788
CVE-2025-68795
CVE-2025-68796
CVE-2025-68797
CVE-2025-68799
CVE-2025-68800
CVE-2025-68801
CVE-2025-68803
CVE-2025-68804
CVE-2025-68808
CVE-2025-68813
CVE-2025-68815
CVE-2025-68816
CVE-2025-68818
CVE-2025-68819
CVE-2025-68820
CVE-2025-71064
CVE-2025-71066
CVE-2025-71069
CVE-2025-71075
CVE-2025-71077
CVE-2025-71079
CVE-2025-71084
CVE-2025-71085
CVE-2025-71086
CVE-2025-71087
CVE-2025-71091
CVE-2025-71093
CVE-2025-71096
CVE-2025-71097
CVE-2025-71098
CVE-2025-71102
CVE-2025-71104
CVE-2025-71105
CVE-2025-71108
CVE-2025-71111
CVE-2025-71112
CVE-2025-71113
CVE-2025-71114
CVE-2025-71116
CVE-2025-71118
CVE-2025-71120
CVE-2025-71123
CVE-2025-71125
CVE-2025-71127
CVE-2025-71131
CVE-2025-71136
CVE-2025-71137
CVE-2025-71154
CVE-2025-71162
CVE-2025-71182
CVE-2025-71185
CVE-2025-71186
CVE-2025-71190
CVE-2025-71191
CVE-2025-71194
CVE-2025-71196
CVE-2025-71197
CVE-2025-71199
CVE-2026-22976
CVE-2026-22977
CVE-2026-22978
CVE-2026-22980
CVE-2026-22990
CVE-2026-22991
CVE-2026-22997
CVE-2026-22998
CVE-2026-22999
CVE-2026-23001
CVE-2026-23003
CVE-2026-23011
CVE-2026-23020
CVE-2026-23021
CVE-2026-23033
CVE-2026-23038
CVE-2026-23047
CVE-2026-23049
CVE-2026-23056
CVE-2026-23058
CVE-2026-23060
CVE-2026-23061
CVE-2026-23063
CVE-2026-23064
CVE-2026-23071
CVE-2026-23073
CVE-2026-23074
CVE-2026-23075
CVE-2026-23076
CVE-2026-23080
CVE-2026-23083
CVE-2026-23084
CVE-2026-23085
CVE-2026-23087
CVE-2026-23089
CVE-2026-23090
CVE-2026-23091
CVE-2026-23095
CVE-2026-23096
CVE-2026-23097
CVE-2026-23098
CVE-2026-23101
CVE-2026-23103
CVE-2026-23105
CVE-2026-23108
CVE-2026-23110
Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.ELA-1644-1 linux-5.10 security update
ELA-1643-1 linux-6.1 security update
Package : linux-6.1
Version : 6.1.162-1~deb9u1 (stretch), 6.1.162-1~deb10u1 (buster)
Related CVEs :
CVE-2023-52658
CVE-2023-53421
CVE-2023-54285
CVE-2024-42079
CVE-2024-46786
CVE-2024-49968
CVE-2025-21946
CVE-2025-22022
CVE-2025-22083
CVE-2025-22090
CVE-2025-22107
CVE-2025-22111
CVE-2025-22121
CVE-2025-37926
CVE-2025-38022
CVE-2025-38104
CVE-2025-38125
CVE-2025-38129
CVE-2025-38232
CVE-2025-38361
CVE-2025-38408
CVE-2025-38591
CVE-2025-38718
CVE-2025-39721
CVE-2025-39871
CVE-2025-40039
CVE-2025-40110
CVE-2025-40149
CVE-2025-40164
CVE-2025-40215
CVE-2025-68211
CVE-2025-68223
CVE-2025-68254
CVE-2025-68255
CVE-2025-68256
CVE-2025-68257
CVE-2025-68258
CVE-2025-68259
CVE-2025-68261
CVE-2025-68263
CVE-2025-68264
CVE-2025-68266
CVE-2025-68291
CVE-2025-68325
CVE-2025-68332
CVE-2025-68335
CVE-2025-68336
CVE-2025-68337
CVE-2025-68340
CVE-2025-68344
CVE-2025-68345
CVE-2025-68346
CVE-2025-68347
CVE-2025-68349
CVE-2025-68354
CVE-2025-68362
CVE-2025-68363
CVE-2025-68364
CVE-2025-68365
CVE-2025-68366
CVE-2025-68367
CVE-2025-68369
CVE-2025-68371
CVE-2025-68372
CVE-2025-68380
CVE-2025-68724
CVE-2025-68725
CVE-2025-68727
CVE-2025-68728
CVE-2025-68732
CVE-2025-68733
CVE-2025-68740
CVE-2025-68742
CVE-2025-68746
CVE-2025-68753
CVE-2025-68757
CVE-2025-68758
CVE-2025-68759
CVE-2025-68764
CVE-2025-68765
CVE-2025-68766
CVE-2025-68767
CVE-2025-68769
CVE-2025-68771
CVE-2025-68772
CVE-2025-68773
CVE-2025-68774
CVE-2025-68776
CVE-2025-68777
CVE-2025-68778
CVE-2025-68780
CVE-2025-68781
CVE-2025-68782
CVE-2025-68783
CVE-2025-68785
CVE-2025-68786
CVE-2025-68787
CVE-2025-68788
CVE-2025-68795
CVE-2025-68796
CVE-2025-68797
CVE-2025-68798
CVE-2025-68799
CVE-2025-68800
CVE-2025-68801
CVE-2025-68803
CVE-2025-68804
CVE-2025-68806
CVE-2025-68808
CVE-2025-68813
CVE-2025-68814
CVE-2025-68815
CVE-2025-68816
CVE-2025-68817
CVE-2025-68818
CVE-2025-68819
CVE-2025-68820
CVE-2025-68821
CVE-2025-71064
CVE-2025-71066
CVE-2025-71069
CVE-2025-71071
CVE-2025-71075
CVE-2025-71077
CVE-2025-71078
CVE-2025-71079
CVE-2025-71081
CVE-2025-71082
CVE-2025-71083
CVE-2025-71084
CVE-2025-71085
CVE-2025-71086
CVE-2025-71087
CVE-2025-71088
CVE-2025-71091
CVE-2025-71093
CVE-2025-71094
CVE-2025-71095
CVE-2025-71096
CVE-2025-71097
CVE-2025-71098
CVE-2025-71102
CVE-2025-71104
CVE-2025-71105
CVE-2025-71108
CVE-2025-71111
CVE-2025-71112
CVE-2025-71113
CVE-2025-71114
CVE-2025-71116
CVE-2025-71118
CVE-2025-71119
CVE-2025-71120
CVE-2025-71121
CVE-2025-71123
CVE-2025-71125
CVE-2025-71126
CVE-2025-71127
CVE-2025-71130
CVE-2025-71131
CVE-2025-71132
CVE-2025-71133
CVE-2025-71136
CVE-2025-71137
CVE-2025-71147
CVE-2025-71149
CVE-2025-71150
CVE-2025-71154
CVE-2025-71162
CVE-2025-71163
CVE-2025-71180
CVE-2025-71182
CVE-2025-71183
CVE-2025-71185
CVE-2025-71186
CVE-2025-71189
CVE-2025-71190
CVE-2025-71191
CVE-2025-71192
CVE-2025-71194
CVE-2025-71196
CVE-2025-71197
CVE-2025-71199
CVE-2026-22976
CVE-2026-22977
CVE-2026-22978
CVE-2026-22979
CVE-2026-22980
CVE-2026-22982
CVE-2026-22984
CVE-2026-22990
CVE-2026-22991
CVE-2026-22992
CVE-2026-22994
CVE-2026-22997
CVE-2026-22998
CVE-2026-22999
CVE-2026-23001
CVE-2026-23003
CVE-2026-23005
CVE-2026-23006
CVE-2026-23010
CVE-2026-23011
CVE-2026-23019
CVE-2026-23020
CVE-2026-23021
CVE-2026-23025
CVE-2026-23026
CVE-2026-23030
CVE-2026-23031
CVE-2026-23033
CVE-2026-23037
CVE-2026-23038
CVE-2026-23047
CVE-2026-23049
CVE-2026-23054
CVE-2026-23056
CVE-2026-23058
CVE-2026-23060
CVE-2026-23061
CVE-2026-23063
CVE-2026-23064
CVE-2026-23068
CVE-2026-23069
CVE-2026-23071
CVE-2026-23073
CVE-2026-23074
CVE-2026-23075
CVE-2026-23076
CVE-2026-23078
CVE-2026-23080
CVE-2026-23083
CVE-2026-23084
CVE-2026-23085
CVE-2026-23086
CVE-2026-23087
CVE-2026-23089
CVE-2026-23090
CVE-2026-23091
CVE-2026-23093
CVE-2026-23095
CVE-2026-23096
CVE-2026-23097
CVE-2026-23098
CVE-2026-23099
CVE-2026-23101
CVE-2026-23102
CVE-2026-23103
CVE-2026-23105
CVE-2026-23107
CVE-2026-23108
CVE-2026-23110
Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.ELA-1643-1 linux-6.1 security update
[SECURITY] [DSA 6134-1] pdns-recursor security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-6134-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
February 13, 2026 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : pdns-recursor
CVE ID : CVE-2026-0398 CVE-2026-24027
Two vulnerabiliites have been discovered in PDNS Recursor, a resolving
name server which result result in denial of service when processing a
malformed zone file.
For the stable distribution (trixie), these problems have been fixed in
version 5.2.8-0+deb13u1.
We recommend that you upgrade your pdns-recursor packages.
For the detailed security status of pdns-recursor please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/pdns-recursor
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/