Recent Changes - Search:
NTLUG

Linux is free.
Life is good.

Linux Training
10am on Meeting Days!

1825 Monetary Lane Suite #104 Carrollton, TX

Do a presentation at NTLUG.

What is the Linux Installation Project?

Real companies using Linux!

Not just for business anymore.

Providing ready to run platforms on Linux

<< Mandriva | Distributions | Gentoo >>


Community

Support

Debian Planet

Error: It's not possible to reach RSS file http://planet.debian.net/rss20.xml ...

Debian Security Notices

  • DSA-6074-1 webkit2gtk - security update
    The following vulnerabilities have been discovered in the WebKitGTKweb engine:
    CVE-2025-13947
    Janet Black discovered that a website may be able to exfiltrate sensitive system information.
    CVE-2025-43421
    Nan Wang discovered that processing maliciously crafted web content may lead to an unexpected process crash.
    CVE-2025-43458
    Phil Beauvoir discovered that processing maliciously crafted web content may lead to an unexpected process crash.
    CVE-2025-66287
    Stanislav Fort discovered that processing maliciously crafted web content may lead to an unexpected process crash.
    https://security-tracker.debian.org/tracker/DSA-6074-1





  • DSA-6070-1 webkit2gtk - security update
    The following vulnerabilities have been discovered in the WebKitGTKweb engine:
    CVE-2025-43392
    Tom Van Goethem discovered that a website may exfiltrate image data cross-origin.
    CVE-2025-43425
    An anonymous researcher discovered that processing maliciously crafted web content may lead to an unexpected process crash.
    CVE-2025-43427
    Gary Kwong and rheza discovered that processing maliciously crafted web content may lead to an unexpected process crash.
    CVE-2025-43429
    Google Big Sleep discovered that processing maliciously crafted web content may lead to an unexpected process crash.
    CVE-2025-43430
    Google Big Sleep discovered that processing maliciously crafted web content may lead to an unexpected process crash.
    CVE-2025-43431
    Google Big Sleep discovered that processing maliciously crafted web content may lead to memory corruption.
    CVE-2025-43432
    Hossein Lotfi discovered that processing maliciously crafted web content may lead to an unexpected process crash.
    CVE-2025-43434
    Google Big Sleep discovered that processing maliciously crafted web content may lead to an unexpected browser crash.
    CVE-2025-43440
    Nan Wang discovered that processing maliciously crafted web content may lead to an unexpected process crash.
    CVE-2025-43443
    An anonymous researcher discovered that processing maliciously crafted web content may lead to an unexpected process crash.
    https://security-tracker.debian.org/tracker/DSA-6070-1















  • DSA-6056-1 keystone - security update
    A vulnerability was discovered in the ec2tokens and s3tokens APIs ofKeystone, the OpenStack identity service, which may result inauthorisation bypass or privilege escalation if /v3/ec2tokens or/v3/s3tokens are reachable by unauthenticated clients.
    The Swift object storage service also requires an update to work withthe updated Keystone: The update to Swift is provided as 2.30.1-0+deb12u1for bookworm and 2.35.1-0+deb13u1 for trixie and is backwards-compatiblewith older Keystone versions. As such, it is recommended to first upgradeSwift before deploying the Keystone update.
    https://security-tracker.debian.org/tracker/DSA-6056-1












  • DSA-6045-1 pdns-recursor - security update
    Two vulnerabiliites have been discovered in PDNS Recursor, a resolvingname server: Delegation information was insufficiently validated, whichcould result in cache pollution.
    These changes are too intrusive to be backported to the version ofthe PDNS recursor in the oldstable distribution (bookworm). Foraffected setups an update to Debian stable/trixie is recommended,no further security updates for pdns-recursor in Bookworm will be issued.
    https://security-tracker.debian.org/tracker/DSA-6045-1


Debian Forum at linuxquestions.org

Page last modified on September 14, 2006, at 05:07 AM