You are here
Security
DSA-5942-1 chromium - security update
DSA-5941-1 gst-plugins-bad1.0 - security update
DSA-5940-1 modsecurity-apache - security update
DSA-5939-1 gimp - security update
DSA-5938-1 python-tornado - security update
DSA-5937-1 webkit2gtk - security update
CVE-2025-24223
rheza and an anonymous researcher discovered that processing maliciously crafted web content may lead to memory corruption.
CVE-2025-31204
Nan Wang discovered that processing maliciously crafted web content may lead to memory corruption.
CVE-2025-31205
Ivan Fratric discovered that a malicious website may exfiltrate data cross-origin.
CVE-2025-31206
An anonymous researcher discovered that processing maliciously crafted web content may lead to an unexpected process crash.
CVE-2025-31215
Jiming Wang and Jikai Ren discovered that processing maliciously crafted web content may lead to an unexpected process crash.
CVE-2025-31257
Juergen Schmied discovered that processing maliciously crafted web content may lead to an unexpected process crash.
DSA-5936-1 libfile-find-rule-perl - security update
DSA-5935-1 chromium - security update
DSA-5934-1 roundcube - security update
DSA-5933-1 tcpdf - security update
DSA-5932-1 thunderbird - security update
DSA-5931-1 systemd - security update
Details can be found in the Qualys advisory at https://www.qualys.com/2025/05/29/apport-coredump/apport-coredump.txt
DSA-5930-1 libavif - security update
DSA-5929-1 chromium - security update
DSA-5923-2 net-tools - regression update
DSA-5928-1 libvpx - security update
DSA-5927-1 yelp - security update
DSA-5926-1 firefox-esr - security update
DSA-5925-1 linux - security update
For CPUs affected to ITS (Indirect Target Selection), to fully mitigate the vulnerability it is also necessary to update the intel-microcode packages released in DSA 5924-1.
For details on the Indirect Target Selection (ITS) vulnerability please refer to https://www.vusec.net/projects/training-solo/ and https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/indirect-target-selection.html .
DSA-5924-1 intel-microcode - security update
For CPUs affected to ITS (Indirect Target Selection), to fully mitigate the vulnerability it is also necessary to update the Linux kernel packages released in a separate, forthcoming DSA.
For details on the Indirect Target Selection (ITS) vulnerability please refer to https://www.vusec.net/projects/training-solo/ and https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/indirect-target-selection.html .
For details on the Branch Privilege Injection vulnerability please refer to https://comsec.ethz.ch/research/microarch/branch-privilege-injection/
Pages
