Debian 10872 Published by

A recent security bulletin addresses two critical vulnerabilities affecting popular software packages. The first update patches libtiff to resolve a heap overflow flaw that could trigger arbitrary code execution or denial of service when handling corrupted image files. Meanwhile, the second advisory fixes simpleeval, a Python utility that previously allowed attackers to bypass sandbox restrictions due to inadequate module reference controls. System administrators should apply these updated package versions across their Debian environments without delay.

ELA-1687-1 tiff security update
[DSA 6220-1] simpleeval security update




ELA-1687-1 tiff security update


Package : tiff
Version : 4.0.8-2+deb9u15 (stretch), 4.1.0+git191117-2~deb10u12 (buster)

Related CVEs :
CVE-2026-4775

Quang Luong discovered a heap overflow in the libtiff library, which may
result in denial of service or the execution of arbitrary code if
malformed image files are processed.
In addition, the stretch update also fixes a heap buffer overflow read.


ELA-1687-1 tiff security update



[SECURITY] [DSA 6220-1] simpleeval security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-6220-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
April 20, 2026 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : simpleeval
CVE ID : CVE-2026-32640

Byambadalai Sumiya discovered that SimpleEval, a library for adding
evaluatable expressions into Python projects, didn't fully restrict some
module references, resulting in sandbox bypass.

For the oldstable distribution (bookworm), this problem has been fixed
in version 0.9.12-1+deb12u1.

For the stable distribution (trixie), this problem has been fixed in
version 1.0.3-1+deb13u1.

We recommend that you upgrade your simpleeval packages.

For the detailed security status of simpleeval please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/simpleeval

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/