[DLA 4466-1] thunderbird security update
[DLA 4467-1] containerd security update
[SECURITY] [DLA 4466-1] thunderbird security update
- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4466-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Emilio Pozuelo Monfort
February 04, 2026 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : thunderbird
Version : 1:140.7.1esr-1~deb11u1
CVE ID : CVE-2026-0818
A security issue was discovered in Thunderbird, which could result in
information disclosure.
For Debian 11 bullseye, this problem has been fixed in version
1:140.7.1esr-1~deb11u1.
We recommend that you upgrade your thunderbird packages.
For the detailed security status of thunderbird please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/thunderbird
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
[SECURITY] [DLA 4467-1] containerd security update
- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4467-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Arnaud Rebillout
February 05, 2026 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : containerd
Version : 1.4.13~ds1-1~deb11u6
CVE ID : CVE-2024-25621 CVE-2025-64329
Debian Bug : 1120285 1120343
Multiple vulnerabilities were discovered in containerd, an open-source
container runtime, used by e.g. Docker or Kubernetes.
CVE-2024-25621
Overly broad default permission vulnerability. Directory paths
`/var/lib/containerd`, `/run/containerd/io.containerd.grpc.v1.cri`
and `/run/containerd/io.containerd.sandbox.controller.v1.shim` were
all created with incorrect permissions.
CVE-2025-64329
Bug in the CRI Attach implementation where a user can exhaust memory
on the host due to goroutine leaks.
For Debian 11 bullseye, these problems have been fixed in version
1.4.13~ds1-1~deb11u6.
We recommend that you upgrade your containerd packages.
For the detailed security status of containerd please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/containerd
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS