Debian 10694 Published by

Multiple security advisories have been issued for various Debian GNU/Linux packages, including pam, ffmpeg, jq, and shibboleth-sp. Attackers could exploit vulnerabilities such as denial of service, privilege escalation, SQL injection, and heap buffer overflows, which these advisories address. The affected packages include pam (CVE-2024-22365 and CVE-2025-6020), ffmpeg (CVE-2025-1594, CVE-2025-7700, and CVE-2025-10256), jq (CVE-2025-48060), and shibboleth-sp (CVE-2025-9943).

Debian GNU/Linux 9 (Stretch) and 10 (Buster) Extended LTS:
ELA-1520-1 jq security update

Debian GNU/Linux 10 (Buster) Extended LTS:
ELA-1521-1 shibboleth-sp security update

Debian GNU/Linux 11 (Bullseye) LTS:
[DLA 4306-1] pam security update
[DLA 4307-1] jq security update

Debian GNU/Linux 13 (Trixie):
[DSA 6007-1] ffmpeg security update



[SECURITY] [DLA 4306-1] pam security update


- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4306-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Bastien Roucari??s
September 21, 2025 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : pam
Version : 1.4.0-9+deb11u2
CVE ID : CVE-2024-22365 CVE-2025-6020
Debian Bug : 1061097 1107919

Multiple vulnerabilities were found in PAM namespace module
used to configure private namespaces for user sessions.

CVE-2024-22365

An attackers can cause a denial of service
(blocked login process) via mkfifo because the
openat call (for protect_dir) lacks O_DIRECTORY.

CVE-2025-6020

pam_namespace may use access user-controlled paths
without proper protection, allowing local users to elevate
their privileges to root via multiple symlink attacks
and race conditions.

For Debian 11 bullseye, these problems have been fixed in version
1.4.0-9+deb11u2.

We recommend that you upgrade your pam packages.

For the detailed security status of pam please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/pam

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



[SECURITY] [DSA 6007-1] ffmpeg security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-6007-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
September 21, 2025 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : ffmpeg
CVE ID : CVE-2025-1594 CVE-2025-7700 CVE-2025-10256

Several vulnerabilities have been discovered in the FFmpeg multimedia
framework, which could result in denial of service or potentially the
execution of arbitrary code if malformed files/streams are processed.

For the stable distribution (trixie), these problems have been fixed in
version 7:7.1.2-0+deb13u1.

We recommend that you upgrade your ffmpeg packages.

For the detailed security status of ffmpeg please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/ffmpeg

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/


ELA-1520-1 jq security update


Package : jq
Version : 1.5+dfsg-1.3+deb9u1 (stretch), 1.5+dfsg-2+deb10u1 (buster)

Related CVEs :
CVE-2025-48060

An issue has been found in jq, a lightweight and flexible command-line JSON processor.
A heap buffer overflow may happen when formatting empty strings.


ELA-1520-1 jq security update



ELA-1521-1 shibboleth-sp security update


Package : shibboleth-sp
Version : 3.0.4+dfsg1-1+deb10u3 (buster)

Related CVEs :
CVE-2025-9943

An SQL injection vulnerability has been identified in the “ID” attribute of the
SAML response when the replay cache of the Shibboleth Service Provider (SP)
is configured to use an SQL database as storage service.
An unauthenticated attacker can exploit this issue via blind SQL injection,
allowing for the extraction of arbitrary data from the database,
if the database connection is configured to use the ODBC plugin.


ELA-1521-1 shibboleth-sp security update



[SECURITY] [DLA 4307-1] jq security update


- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4307-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Thorsten Alteholz
September 21, 2025 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : jq
Version : 1.6-2.1+deb11u1
CVE ID : CVE-2025-48060

An issue has been found in jq, a lightweight and flexible command-line
JSON processor. A heap buffer overflow may happen when formatting empty
strings.

For Debian 11 bullseye, this problem has been fixed in version
1.6-2.1+deb11u1.

We recommend that you upgrade your jq packages.

For the detailed security status of jq please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/jq

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS