Debian 10693 Published by

Debian Security Advisory DSA-5989-1 for Debian GNU/Linux 12 and 13 and Debian LTS advisories DLA 4285-1 and DLA 4284-1 for Debian GNU/Linux 11 LTS were issued to address security vulnerabilities in various packages. The udisks2 package was found to have an out-of-bounds read vulnerability (CVE-2025-8067) that could lead to denial of service or local privilege escalation, which has been fixed in versions 2.9.4-4+deb12u2 and 2.10.1-12.1+deb13u1 for the Bookworm and
Trixie distributions, respectively, as well as in version 2.9.2-2+deb11u3 for Debian 11 Bullseye. Additionally, an issue was found in golang-github-gin-contrib-cors (CVE-2019-25211) that could allow an attacker to circumvent CORS restrictions due to improper wildcard handling, which has been fixed in version 1.3.1-1+deb11u1 for Debian 11 Bullseye. It is recommended to upgrade the affected packages to fix these security vulnerabilities and prevent potential attacks.

[DSA 5989-1] udisks2 security update
[DLA 4285-1] golang-github-gin-contrib-cors security
[DLA 4284-1] udisks2 security update




[SECURITY] [DSA 5989-1] udisks2 security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-5989-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
August 28, 2025 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : udisks2
CVE ID : CVE-2025-8067

Michael Imfeld discovered an out-of-bounds read vulnerability in
udisks2, a D-Bus service to access and manipulate storage devices, which
may result in denial of service (daemon process crash), or in mapping an
internal file descriptor from the daemon process onto a loop device,
resulting in local privilege escalation.

For the oldstable distribution (bookworm), this problem has been fixed
in version 2.9.4-4+deb12u2.

For the stable distribution (trixie), this problem has been fixed in
version 2.10.1-12.1+deb13u1.

We recommend that you upgrade your udisks2 packages.

For the detailed security status of udisks2 please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/udisks2

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/


[SECURITY] [DLA 4285-1] golang-github-gin-contrib-cors security


- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4285-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Thorsten Alteholz
August 28, 2025 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : golang-github-gin-contrib-cors
Version : 1.3.1-1+deb11u1
CVE ID : CVE-2019-25211

An issue has been found in golang-github-gin-contrib-cors, a Gin
middleware/handler to enable CORS support. The issue is related to
improper wildcard handling and an attacker might be able to circumvent
restrictions.

For Debian 11 bullseye, this problem has been fixed in version
1.3.1-1+deb11u1.

We recommend that you upgrade your golang-github-gin-contrib-cors
packages.

For the detailed security status of golang-github-gin-contrib-cors please
refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/golang-github-gin-contrib-cors

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



[SECURITY] [DLA 4284-1] udisks2 security update


- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4284-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Thorsten Alteholz
August 28, 2025 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : udisks2
Version : 2.9.2-2+deb11u3
CVE ID : CVE-2025-8067

Michael Imfeld discovered an out-of-bounds read vulnerability in udisks2,
which may result in denial of service (daemon process crash), or in
mapping an internal file descriptor from the daemon process onto a loop
device, resulting in local privilege escalation.

For Debian 11 bullseye, this problem has been fixed in version
2.9.2-2+deb11u3.

We recommend that you upgrade your udisks2 packages.

For the detailed security status of udisks2 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/udisks2

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS