Debian 10892 Published by

A batch of urgent security updates rolled out covers several widely used tools including OpenJDK Java runtimes, Apache HTTP Server, Wireshark, lrzip, and ImageMagick. These patches fix serious flaws that could let attackers execute arbitrary code, leak private data, crash systems through denial of service attacks, or bypass Kerberos authentication checks. You should upgrade your affected packages right away since Debian has already released stable versions for all supported distributions. Detailed tracking pages and official documentation provide straightforward instructions for applying these critical fixes to your environment.

[DLA 4566-1] openjdk-11 security update
[DLA 4565-1] openjdk-17 security update
ELA-1708-1 openjdk-11 security update
[DSA 6248-1] apache2 security update
[DSA 6249-1] wireshark security update
[DLA 4567-1] lrzip security update
ELA-1710-1 imagemagick security update




[SECURITY] [DLA 4566-1] openjdk-11 security update


- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4566-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Emilio Pozuelo Monfort
May 06, 2026 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : openjdk-11
Version : 11.0.31+11-1~deb11u1
CVE ID : CVE-2026-22007 CVE-2026-22013 CVE-2026-22016 CVE-2026-22018
CVE-2026-22021 CVE-2026-34268 CVE-2026-34282

Several vulnerabilities have been discovered in the OpenJDK Java
runtime, which may result in incorrect generation of cryptographic
keys, denial of service, information disclosure, XEE/XEE attacks
or incorrect validation of Kerberos credentials.

For Debian 11 bullseye, these problems have been fixed in version
11.0.31+11-1~deb11u1.

We recommend that you upgrade your openjdk-11 packages.

For the detailed security status of openjdk-11 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openjdk-11

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



[SECURITY] [DLA 4565-1] openjdk-17 security update


- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4565-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Emilio Pozuelo Monfort
May 06, 2026 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : openjdk-17
Version : 17.0.19+10-1~deb11u1
CVE ID : CVE-2026-22007 CVE-2026-22013 CVE-2026-22016 CVE-2026-22018
CVE-2026-22021 CVE-2026-34268 CVE-2026-34282

Several vulnerabilities have been discovered in the OpenJDK Java
runtime, which may result in incorrect generation of cryptographic
keys, denial of service, information disclosure, XEE/XEE attacks
or incorrect validation of Kerberos credentials.

For Debian 11 bullseye, these problems have been fixed in version
17.0.19+10-1~deb11u1.

We recommend that you upgrade your openjdk-17 packages.

For the detailed security status of openjdk-17 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openjdk-17

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



ELA-1708-1 openjdk-11 security update (by )


Package : openjdk-11


Version : 11.0.31+11-1~deb10u1 (buster)


Related CVEs :

CVE-2026-22007

CVE-2026-22013

CVE-2026-22016

CVE-2026-22018

CVE-2026-22021

CVE-2026-34268

CVE-2026-34282



Several vulnerabilities have been discovered in the OpenJDK Java
runtime, which may result in incorrect generation of cryptographic
keys, denial of service, information disclosure, XEE/XEE attacks
or incorrect validation of Kerberos credentials.


ELA-1708-1 openjdk-11 security update (by )



[SECURITY] [DSA 6248-1] apache2 security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-6248-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
May 06, 2026 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : apache2
CVE ID : CVE-2026-23918 CVE-2026-24072 CVE-2026-28780 CVE-2026-29168
CVE-2026-29169 CVE-2026-33006 CVE-2026-33007 CVE-2026-33523
CVE-2026-33857 CVE-2026-34032 CVE-2026-34059
Debian Bug : 1135737

Multiple vulnerabilities have been discovered in the Apache HTTP server,
which may result in remote code execution, privilege escalation, denial
of service or information disclosure.

For the oldstable distribution (bookworm), these problems have been fixed
in version 2.4.67-1~deb12u2.

For the stable distribution (trixie), these problems have been fixed in
version 2.4.67-1~deb13u2. The fix for CVE-2026-23918 was already
included in the Debian 13.4 point release update versioned
2.4.66-1~deb13u2 to address reported HTTP/2 regressions.

We recommend that you upgrade your apache2 packages.

For the detailed security status of apache2 please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/apache2

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/


[SECURITY] [DSA 6249-1] wireshark security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-6249-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
May 06, 2026 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : wireshark
CVE ID : CVE-2026-5299 CVE-2026-5401 CVE-2026-5403 CVE-2026-5404
CVE-2026-5405 CVE-2026-5406 CVE-2026-5407 CVE-2026-5408
CVE-2026-5409 CVE-2026-5653 CVE-2026-5654 CVE-2026-5656
CVE-2026-5657 CVE-2026-6519 CVE-2026-6520 CVE-2026-6521
CVE-2026-6522 CVE-2026-6523 CVE-2026-6524 CVE-2026-6527
CVE-2026-6529 CVE-2026-6530 CVE-2026-6531 CVE-2026-6532
CVE-2026-6533 CVE-2026-6534 CVE-2026-6535 CVE-2026-6537
CVE-2026-6538 CVE-2026-6867 CVE-2026-6868 CVE-2026-6869
CVE-2026-6870 CVE-2026-7375 CVE-2026-7376 CVE-2026-7378
CVE-2026-7379

Multiple vulnerabilities have been discocvered in Wireshark, a network
protocol analyzer which could result in denial of service or the
execution of arbitrary code.

For the oldstable distribution (bookworm), a subset of these problems
have been fixed in version 4.0.17-0+deb12u3.

For the stable distribution (trixie), these problems have been fixed in
version 4.4.15-0+deb13u1.

We recommend that you upgrade your wireshark packages.

For the detailed security status of wireshark please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wireshark

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/


[SECURITY] [DLA 4567-1] lrzip security update


- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4567-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Chris Lamb
May 06, 2026 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : lrzip
Version : 0.641-1+deb11u2
CVE ID : CVE-2025-15570
Debian Bug : 1128069

It was discovered that there was a potential use-after-free issue in
the lrzip compression/decompression program.

For Debian 11 bullseye, this problem has been fixed in version
0.641-1+deb11u2.

We recommend that you upgrade your lrzip packages.

For the detailed security status of lrzip please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/lrzip

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



ELA-1710-1 imagemagick security update (by )


Package : imagemagick


Version : 8:6.9.7.4+dfsg-11+deb9u28 (stretch)


Related CVEs :

CVE-2026-33899

CVE-2026-33900

CVE-2026-33901

CVE-2026-33905

CVE-2026-33908

CVE-2026-34238

CVE-2026-40310

CVE-2026-40311

CVE-2026-42050



Multiple security vulnerabilities were discovered in imagemagick, a
software suite used for editing and manipulating digital images, which
could lead to denial of service, information disclosure or potentially
arbitrary code execution if malformed images are processed.


ELA-1710-1 imagemagick security update (by )