You are here
Debian Security
DSA-6177-1 chromium - security update
DSA-6176-1 strongswan - security update
The EAP-TTLS plugin doesn't check the length field in the header of attribute-value pairs (AVPs) tunneled in EAP-TTLS, which can cause an integer underflow that may lead to a crash. An unauthenticated attacker could exploit this for a DoS attack by sending a crafted message.
DSA-6175-1 libyaml-syck-perl - security update
DSA-6174-1 spip - security update
DSA-6173-1 freeciv - security update
DSA-6172-1 webkit2gtk - security update
CVE-2025-43214
shandikri discovered that processing maliciously crafted web content may lead to an unexpected process crash.
CVE-2025-43457
Gary Kwong and Hossein Lotfi discovered that processing maliciously crafted web content may lead to an unexpected process crash.
CVE-2025-43511
Lee Dong Ha discovered that processing maliciously crafted web content may lead to an unexpected process crash.
CVE-2026-20608
HanQing and Nan Wang discovered that processing maliciously crafted web content may lead to an unexpected process crash.
CVE-2026-20635
EntryHi discovered that processing maliciously crafted web content may lead to an unexpected process crash.
CVE-2026-20636
EntryHi discovered that processing maliciously crafted web content may lead to an unexpected process crash.
CVE-2026-20644
HanQing and Nan Wang discovered that processing maliciously crafted web content may lead to an unexpected process crash.
CVE-2026-20652
Nathaniel Oh discovered that a remote attacker may be able to cause a denial-of-service.
CVE-2026-20676
Tom Van Goethem discovered that a website may be able to track users through web extensions.
DSA-6171-1 chromium - security update
DSA-6170-1 snapd - security update
DSA-6169-1 imagemagick - security update
DSA-6168-1 freetype - security update
The oldstable distribution (bookworm) is not affected.
DSA-6167-1 gst-plugins-base1.0 - security update
DSA-6166-1 nodejs - security update
DSA-6165-1 chromium - security update
DSA-6164-1 chromium - security update
DSA-6163-1 linux - security update
The Qualys Threat Research Unit (TRU) discovered several vulnerabilities in Apparmor. Details can be found in the Qualys advisory at https://www.qualys.com/2026/03/10/crack-armor.txt
DSA-6162-1 linux - security update
The Qualys Threat Research Unit (TRU) discovered several vulnerabilities in Apparmor. Details can be found in the Qualys advisory at https://www.qualys.com/2026/03/10/crack-armor.txt
DSA-6161-1 multipart - security update
DSA-6160-1 netty - security update
The security update for bookworm also contains the fix for CVE-2024-29025. Julien Viet discovered that Netty was vulnerable to allocation of resources without limits or throttling due to the accumulation of data in the HttpPostRequestDecoder. This would allow an attacker to cause a denial of service.
