[DLA 4533-1] systemd security update
[DLA 4532-1] python3.9 regression and security update
[DSA 6213-1] lxd security update
[DSA 6212-1] incus security update
[SECURITY] [DLA 4533-1] systemd security update
- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4533-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Arnaud Rebillout
April 15, 2026 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : systemd
Version : 247.3-7+deb11u8
CVE ID : CVE-2026-4105 CVE-2026-29111 CVE-2026-40225 CVE-2026-40226
Debian Bug :
The following vulnerabilities have been discovered systemd:
CVE-2026-4105
The systemd-machined service contains an Improper Access Control
vulnerability due to insufficient validation of the class parameter in
the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged
user can exploit this by attempting to register a machine with a
specific class value, which may leave behind a usable,
attacker-controlled machine object. This allows the attacker to invoke
methods on the privileged object, leading to the execution of
arbitrary commands with root privileges on the host system.
CVE-2026-29111
When an unprivileged IPC API call is made with spurious data, a stack
overwrite occurs, with the attacker controlled content.
CVE-2026-40225
udev: local root execution can occur via malicious hardware devices
and unsanitized kernel output.
CVE-2026-40226
nspawn: an escape-to-host action can occur via a crafted optional
config file.
For Debian 11 bullseye, these problems have been fixed in version
247.3-7+deb11u8.
We recommend that you upgrade your systemd packages.
For the detailed security status of systemd please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/systemd
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
[SECURITY] [DLA 4532-1] python3.9 regression and security update
- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4532-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Arnaud Rebillout
April 15, 2026 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : python3.9
Version : 3.9.2-1+deb11u6
CVE ID : CVE-2025-15366 CVE-2025-15367 CVE-2026-6100
Debian Bug :
It was found that the patches for CVE-2025-15366 and CVE-2025-15367
break backward compatibility, and upstream decided not to backport those
patches to older Python releases. Therefore those 2 patches, applied in
the previous version (python3.9 3.9.2-1+deb11u5), have been reverted.
Additionally, the following CVE have been fixed:
CVE-2026-6100
Use-after-free (UAF) was possible in the `lzma.LZMADecompressor` and
`bz2.BZ2Decompressor` when a memory allocation fails with a
`MemoryError` and the decompression instance is re-used. This
scenario can be triggered if the process is under memory pressure.
The vulnerability is only present if the program re-uses
decompressor instances across multiple decompression calls even
after a `MemoryError` is raised during decompression. Using the
helper functions to one-shot decompress data such as
`lzma.decompress()` and `bz2.decompress()` are not affected as a new
decompressor instance is used per call. If the decompressor instance
is not re-used after an error condition, this usage is similarly not
vulnerable.
For Debian 11 bullseye, these problems have been fixed in version
3.9.2-1+deb11u6.
We recommend that you upgrade your python3.9 packages.
For the detailed security status of python3.9 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/python3.9
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
[SECURITY] [DSA 6213-1] lxd security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-6213-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
April 15, 2026 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : lxd
CVE ID : CVE-2026-34177 CVE-2026-34178 CVE-2026-34179
Multiple security issues were discovered in LXD, a system container and
virtual machine manager, which could result in restriction bypass or
privilege escalation.
For the oldstable distribution (bookworm), these problems have been fixed
in version 5.0.2-5+deb12u5.
For the stable distribution (trixie), these problems have been fixed in
version 5.0.2+git20231211.1364ae4-9+deb13u5.
We recommend that you upgrade your lxd packages.
For the detailed security status of lxd please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/lxd
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
[SECURITY] [DSA 6212-1] incus security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-6212-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
April 15, 2026 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : incus
CVE ID : CVE-2026-34178 CVE-2026-34179
Two security issues were discovered in Incus, a system container and
virtual machine manager, which could result in restriction bypass
or privilege escalation.
For the stable distribution (trixie), these problems have been fixed in
version 6.0.4-2+deb13u6.
We recommend that you upgrade your incus packages.
For the detailed security status of incus please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/incus
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/