Debian 10703 Published by

The Debian project has released security updates for several packages, including libapache2-mod-auth-openidc, webkit2gtk, and openvpn. The updates fix vulnerabilities that could allow attackers to crash or exploit systems, with fixes available for various distributions, including Buster, Bookworm, and Trixie. Specific issues addressed in the updates include a denial-of-service vulnerability in mod_auth_openidc, multiple crashes and memory corruption bugs in WebKitGTK, and a flaw allowing bypass of source IP address validation in openvpn.

Debian GNU/Linux 10 (Buster) ELTS:
ELA-1587-1 libapache2-mod-auth-openidc security update

Debian GNU/Linux 12 (Bookworm) and 13 (Trixie):
[DSA 6070-1] webkit2gtk security update
[DSA 6069-1] openvpn security update



ELA-1587-1 libapache2-mod-auth-openidc security update


Package : libapache2-mod-auth-openidc
Version : 2.3.10.2-1+deb10u5 (buster)

Related CVEs :
CVE-2025-3891

A vulnerability has been fixed in mod_auth_openidc, an OpenID
Certified authentication and authorization module for the Apache 2.x
HTTP server that implements the OpenID Connect Relying Party
functionality.

An unauthenticated attacker can crash the Apache httpd process by
sending a POST request without a Content-Type header when
OIDCPreservePost is enabled in mod_auth_openidc. This leads to denial
of service.

A workaround is to disable the OIDCPreservePost directive.


ELA-1587-1 libapache2-mod-auth-openidc security update



[SECURITY] [DSA 6070-1] webkit2gtk security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-6070-1 security@debian.org
https://www.debian.org/security/ Alberto Garcia
December 04, 2025 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : webkit2gtk
CVE ID : CVE-2025-43392 CVE-2025-43425 CVE-2025-43427 CVE-2025-43429
CVE-2025-43430 CVE-2025-43431 CVE-2025-43432 CVE-2025-43434
CVE-2025-43440 CVE-2025-43443

The following vulnerabilities have been discovered in the WebKitGTK
web engine:

CVE-2025-43392

Tom Van Goethem discovered that a website may exfiltrate image
data cross-origin.

CVE-2025-43425

An anonymous researcher discovered that processing maliciously
crafted web content may lead to an unexpected process crash.

CVE-2025-43427

Gary Kwong and rheza discovered that processing maliciously
crafted web content may lead to an unexpected process crash.

CVE-2025-43429

Google Big Sleep discovered that processing maliciously crafted
web content may lead to an unexpected process crash.

CVE-2025-43430

Google Big Sleep discovered that processing maliciously crafted
web content may lead to an unexpected process crash.

CVE-2025-43431

Google Big Sleep discovered that processing maliciously crafted
web content may lead to memory corruption.

CVE-2025-43432

Hossein Lotfi discovered that processing maliciously crafted web
content may lead to an unexpected process crash.

CVE-2025-43434

Google Big Sleep discovered that processing maliciously crafted
web content may lead to an unexpected browser crash.

CVE-2025-43440

Nan Wang discovered that processing maliciously crafted web
content may lead to an unexpected process crash.

CVE-2025-43443

An anonymous researcher discovered that processing maliciously
crafted web content may lead to an unexpected process crash.

For the oldstable distribution (bookworm), these problems have been fixed
in version 2.50.2-1~deb12u1.

For the stable distribution (trixie), these problems have been fixed in
version 2.50.2-1~deb13u1.

We recommend that you upgrade your webkit2gtk packages.

For the detailed security status of webkit2gtk please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/webkit2gtk

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/


[SECURITY] [DSA 6069-1] openvpn security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-6069-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
December 03, 2025 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : openvpn
CVE ID : CVE-2025-13086
Debian Bug : 1121086

It was discovered that openvpn, a virtual private network application,
does not properly handle HMAC verification checks. A remote attacker can
take advantage of this flaw to bypass source IP address validation.

For the oldstable distribution (bookworm), this problem has been fixed
in version 2.6.3-1+deb12u4.

For the stable distribution (trixie), this problem has been fixed in
version 2.6.14-1+deb13u1.

We recommend that you upgrade your openvpn packages.

For the detailed security status of openvpn please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/openvpn

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/