You are here
Security
DSA-6047-1 squid - security update
DSA-6046-1 chromium - security update
DSA-6045-1 pdns-recursor - security update
These changes are too intrusive to be backported to the version of the PDNS recursor in the oldstable distribution (bookworm). For affected setups an update to Debian stable/trixie is recommended, no further security updates for pdns-recursor in Bookworm will be issued.
DSA-6044-1 xorg-server - security update
DSA-6043-1 gimp - security update
DSA-6042-1 webkit2gtk - security update
CVE-2025-43272
Big Bear discovered that processing maliciously crafted web content may lead to an unexpected process crash.
CVE-2025-43342
An anonymous researcher discovered that processing maliciously crafted web content may lead to an unexpected process crash.
CVE-2025-43343
An anonymous researcher discovered that processing maliciously crafted web content may lead to an unexpected process crash.
CVE-2025-43356
Jaydev Ahire discovered that a website may be able to access sensor information without user consent.
CVE-2025-43368
Pawel Wylecial discovered that processing maliciously crafted web content may lead to an unexpected process crash.
This WebKitGTK update causes a compatibility problem with older versions of Evolution when handling e-mail attachments. For this reason, fixed versions of Evolution have also been released along with this WebKitGTK update.
DSA-6041-1 strongswan - security update
The eap-mschapv2 plugin doesn't correctly check the length of an EAP-MSCHAPv2 Failure Request packet on the client, which can cause an integer underflow that leads to a crash, and a heap-based buffer overflow that's potentially exploitable for remote code execution.
