Debian 10281 Published by

Debian GNU/Linux 12.9 has been released, representing the ninth update of its stable distribution, Debian 12 (Bookworm). This point release is primarily dedicated to addressing security vulnerabilities and rectifying critical issues. The update does not represent a new version of Debian 12; it merely updates certain packages included within it. Packages may be upgraded to the latest versions utilizing a current Debian mirror following installation.




Updated Debian 12: 12.9 released

The Debian project is pleased to announce the ninth update of its stable distribution Debian 12 (codename bookworm). This point release mainly adds corrections for security issues, along with a few adjustments for serious problems. Security advisories have already been published separately and are referenced where available.

Please note that the point release does not constitute a new version of Debian 12 but only updates some of the packages included. There is no need to throw away old bookworm media. After installation, packages can be upgraded to the current versions using an up-to-date Debian mirror.

Those who frequently install updates from security.debian.org won't have to update many packages, and most such updates are included in the point release.

New installation images will be available soon at the regular locations.

Upgrading an existing installation to this revision can be achieved by pointing the package management system at one of Debian's many HTTP mirrors. A comprehensive list of mirrors is available at:

Debian_12

Miscellaneous Bugfixes

This stable update adds a few important corrections to the following packages:

PackageReason
allow-html-tempUpdate for Thunderbird 128 compatibility
ansible-coreNew upstream stable release; fix arbitrary code execution issue [CVE-2024-11079]; fix information disclosure issue [CVE-2024-8775]; fix file overwrite issue [CVE-2024-9902]; fix test failure
audiofileFix null pointer dereference issue [CVE-2019-13147]; fix information leak issue [CVE-2022-24599]
avahiFix denial of service issues [CVE-2023-38469 CVE-2023-38470 CVE-2023-38471 CVE-2023-38472 CVE-2023-38473]; fix browsing when invalid services are present
base-filesUpdate for the point release
bochsBuild BIOS images for i386 CPUs
cpuinfoMake test failures during build non-fatal
criuDynamically handle different libc at runtime than compilation time
debian-installerIncrease Linux kernel ABI to 6.1.0-29; rebuild against proposed-updates
debian-installer-netboot-imagesRebuild against proposed-updates
debian-security-supportUpdate list of packages receiving limited support in bookworm
debootstrapDo not pull in usr-is-merged in trixie/sid
dnsmasqFix denial of service issues [CVE-2023-50387 CVE-2023-50868]; set default maximum EDNS.0 UDP packet size to 1232 [CVE-2023-28450]
eas4tbsyncUpdate for Thunderbird 128 compatibility
espeak-ngFix dropping last byte of stdin input
geoclue-2.0Use beaconDB rather than the now retired Mozilla Location Service
glib2.0Fix buffer overflow when configured to use a SOCKS4a proxy with a very long username [CVE-2024-52533]
gnuchessFix arbitrary code execution issue [CVE-2021-30184]
grml-rescuebootUpdate supported architectures from amd64/i386 to arm64/amd64
gslFix buffer overflow calculating the quantile value [CVE-2020-35357]
gst-plugins-base1.0Don't try parsing extended header if not enough data is available (id3v2) [CVE-2024-47542]
gunicornPrevent HTTP request smuggling [CVE-2024-1135]
icinga2Prevent TLS certificate bypass [CVE-2024-49369]
intel-microcodeNew upstream security release [CVE-2024-21853 CVE-2024-23918 CVE-2024-24968 CVE-2024-23984]
jinja2Prevent HTML attribute injection [CVE-2024-22195 CVE-2024-34064]
lemonldap-ngFix privilege escalation when adaptive auth levels used [CVE-2024-52946]; fix XSS in upgrade plugin [CVE-2024-52947]
libebmlFix buffer overflow issue [CVE-2023-52339]
libpgjavaFix SQL injection issue [CVE-2024-1597]
libsoup2.4Prevent HTTP request smuggling [CVE-2024-52530]; fix buffer overflow in soup_header_parse_param_list_strict [CVE-2024-52531]; fix DoS reading from WebSocket clients [CVE-2024-52532]
libxstream-javaFix denial of service issue [CVE-2024-47072]
linuxNew upstream release; bump ABI to 29
linux-signed-amd64New upstream release; bump ABI to 29
linux-signed-arm64New upstream release; bump ABI to 29
linux-signed-i386New upstream release; bump ABI to 29
live-bootAttempt DHCP on all connected interfaces
llvm-toolchain-19New source package, to support builds of chromium
lxcFix null pointer dereference when using a shared rootfs
mailmindrUpdate for Thunderbird 128 compatibility
nfs-utilsFix referrals when --enable-junction=no
nvidia-graphics-driversNew upstream stable release [CVE-2024-0126]
nvidia-open-gpu-kernel-modulesNew upstream LTS release [CVE-2024-0126]
oarAdd missing dependency on libcgi-fast-perl; fix oar user creation on new installations; fix SVG functions with PHP 8
openscFix data leak issue [CVE-2023-5992]; fix use-after-free issue [CVE-2024-1454]; fix missing initialisation issue [CVE-2024-45615]; fix various issues with APDU buffer handling [CVE-2024-45616]; fix missing or incorrect function return value checks [CVE-2024-45617 CVE-2024-45618]; fix incorrect handling of length of buffers or files issues [CVE-2024-45619 CVE-2024-45620]; fix arbitary code execution issue [CVE-2024-8443]
opensshAlways use internal mkdtemp implementation; fix gssapi-keyex declaration; add ssh-gssapi automated test; don't prefer host-bound public key signatures if there was no initial host key; make sntrup761x25519-sha512 key exchange algorithm available without the @openssh.com suffix too
pgtclInstall library in default Tcl auto_path
pocoFix integer overflow issue [CVE-2023-52389]
prometheus-node-exporter-collectorsReinstate missing `apt_package_cache_timestamp_seconds` metrics; fix apt_upgrades_pending and apt_upgrades_held metrics; improve heuristic for apt update last run time
pypy3Fix email address parsing issue [CVE-2023-27043]; fix possible Server Side Request Forgery issue [CVE-2024-11168]; fix private IP address range parsing [CVE-2024-4032]; fix regular expression based Denial of Service issue [CVE-2024-6232]; fix header injection issue [CVE-2024-6923]; fix denial of service issue [CVE-2024-7592 CVE-2024-8088]; fix command injection issue [CVE-2024-9287]
python-asyncsshFix rogue extension negotiation issue [CVE-2023-46445]; fix rogue session attack issue [CVE-2023-46446]
python-tornadoFix open redirect issue [CVE-2023-28370]; fix denial of service issue [CVE-2024-52804]
python-urllib3Fix possible information leak during cross-origin redirects [CVE-2023-43804]; fix request body not stripped after redirect from 303 status changes request method to GET [CVE-2023-45803]; fix Proxy-Authorization request header isn't stripped during cross-origin redirects [CVE-2024-37891]
python-werkzeugFix denial of service when file upload begins with CR or LF [CVE-2023-46136]; fix arbitrary code execution on developer's machine via the debugger [CVE-2024-34069]; fix denial of service when processing multipart/form-data requests [CVE-2024-49767]
python3.11Reject malformed addresses in email.parseaddr() [CVE-2023-27043]; encode newlines in headers in the email module [CVE-2024-6923]; fix quadratic complexity parsing cookies with backslashes [CVE-2024-7592]; fix venv activation scripts failure to quote paths [CVE-2024-9287]; fix improper validation of bracketed hosts in urllib functions [CVE-2024-11168]
qemuNew upstream bugfix release [CVE-2024-7409]; mark internal codegen helper symbols as hidden, fixing build failure on arm64
quicktextUpdate for Thunderbird 128 compatibility
redisFix denial of service with malformed ACL selectors [CVE-2024-31227]; fix denial of service through unbound pattern matching [CVE-2024-31228]; fix stack overflow [CVE-202431449]
renderdocFix integer overflows [CVE-2023-33863 CVE-2023-33864]; fix symlink attack vector [CVE-2023-33865]
ruby-doorkeeperPrevent skipping of authorization steps [CVE-2023-34246]
setuptoolsFix remote code execution issue [CVE-2024-6345]
sqlparseFix regular expression-related denial of service issue [CVE-2023-30608]; fix denial of service issue [CVE-2024-4340]
srtFix dependencies for consumers of the -dev packages
systemdNew upstream stable release
tangoMake the property_* tables compatible with MariaDB 10.11 at install time; add autopkgtest
tbsyncUpdate for Thunderbird 128 compatibility
texlive-binFix data loss when using discretionaries with priorities; fix heap buffer overflow [CVE-2024-25262]
tiffFix buffer overflow issues [CVE-2023-25433 CVE-2023-26966]; fix use-after-free issue [CVE-2023-26965]; fix null pointer dereference issue [CVE-2023-2908]; fix denial of service issues [CVE-2023-3618 CVE-2023-52356 CVE-2024-7006]
tzdataNew upstream release: improve historical data for some zones; confirm lack of leap second for 2024
ucfInitialise variable subsequently passed to eval
util-linuxFix wider mitigation for CVE-2024-28085
xsaneAdd Recommends for firefox-esr as well as firefox
zfs-linuxAdd missing symbols in libzfs4linux and libzpool5linux; fix dnode dirty test [CVE-2023-49298]; fix sharenfs IPv6 address parsing [CVE-2013-20001]; fixes related to NULL pointer, memory allocation, etc.
zookeeperFix information disclosure in persistent watchers handling [CVE-2024-23944]

Security Updates

This revision adds the following security updates to the stable release. The Security Team has already released an advisory for each of these updates:

Advisory IDPackage
DSA-5801 firefox-esr
DSA-5803 thunderbird
DSA-5804 webkit2gtk
DSA-5805 guix
DSA-5806 libarchive
DSA-5807 nss
DSA-5808 ghostscript
DSA-5809 symfony
DSA-5810 chromium
DSA-5811 mpg123
DSA-5812 postgresql-15
DSA-5813 symfony
DSA-5814 thunderbird
DSA-5815 needrestart
DSA-5816 libmodule-scandeps-perl
DSA-5817 chromium
DSA-5818 linux-signed-amd64
DSA-5818 linux-signed-arm64
DSA-5818 linux-signed-i386
DSA-5818 linux
DSA-5819 php8.2
DSA-5820 firefox-esr
DSA-5821 thunderbird
DSA-5822 simplesamlphp
DSA-5823 webkit2gtk
DSA-5824 chromium
DSA-5825 ceph
DSA-5826 smarty3
DSA-5827 proftpd-dfsg
DSA-5828 python-aiohttp
DSA-5829 chromium
DSA-5830 smarty4
DSA-5831 gst-plugins-base1.0
DSA-5832 gstreamer1.0
DSA-5833 dpdk
DSA-5835 webkit2gtk
DSA-5837 fastnetmon
DSA-5838 gst-plugins-good1.0

Removed packages

The following packages were removed due to circumstances beyond our control:

PackageReason
criu[armhf] Fails to build on arm64 host
tk-html3Unmaintained; security issues

Debian Installer

The installer has been updated to include the fixes incorporated into stable by the point release.

URLs

The complete lists of packages that have changed with this revision:

The current stable distribution:

Proposed updates to the stable distribution:

stable distribution information (release notes, errata etc.):

Security announcements and information:

About Debian

The Debian Project is an association of Free Software developers who volunteer their time and effort in order to produce the completely free operating system Debian.

Contact Information

For further information, please visit the Debian web pages at  https://www.debian.org/, send mail to <press@debian.org>, or contact the stable release team at <debian-release@lists.debian.org>.