LibXML2, Expat, U-Boot, Jinja2, Firefox-ESR, VIPS, fig2dev, QEMU, Request Tracker updates for Debian

Published by

Debian GNU/Linux has recently implemented security updates across several packages, including LibXML2, Expat, U-Boot, Jinja2, Firefox-ESR, VIPS, fig2dev, and QEMU, affecting various versions of the operating system (Jessie, Stretch, Buster, Bullseye, and Bookworm).

Key Updates Across Debian Versions:
1. LibXML2:
- Security updates were issued for all versions, addressing CVEs related to out-of-bounds memory access and heap-buffer overflow.
- Fixed in versions:
- Jessie: 2.9.1+dfsg1-5+deb8u19
- Stretch: 2.9.4+dfsg1-2.2+deb9u13
- Buster: 2.9.4+dfsg1-7+deb10u11
- Bullseye: 2.9.10+dfsg-6.7+deb11u7

2. Expat:
- A security update for vulnerabilities that could cause crashes was addressed in versions for Stretch and Buster.
- Fixed in versions:
- Stretch: 2.2.0-2+deb9u10
- Buster: 2.2.6-2+deb10u9
- Bullseye: 2.2.10-2+deb11u7

3. U-Boot:
- Several vulnerabilities were discovered affecting the bootloader for embedded systems, including buffer overflows and integer overflows.
- Fixed in Bullseye version: 2021.01+dfsg-5+deb11u1.

4. Jinja2:
- A regression update reinstated support for Python 2 after a previous fix did not accommodate it.
- Fixed in version: 2.11.3-1+deb11u4.

5. Firefox-ESR:
- Multiple security issues were resolved, including potential code execution vulnerabilities.
- Fixed in Bookworm version: 128.10.0esr-1~deb12u1.

6. VIPS:
- Addressed a heap-based buffer overflow vulnerability found in image processing.
- Fixed in Bullseye version: 8.10.5-2+deb11u1.

7. fig2dev:
- Multiple vulnerabilities that could lead to code execution or denial of service were fixed.
- Fixed in Bullseye version: 1:3.2.8-3+deb11u3.

8. QEMU:
- Resolved multiple issues including buffer overflows and information leaks.
- Fixed in Bullseye version: 1:5.2+dfsg-11+deb11u4.

Recommendations:
Users are strongly encouraged to upgrade their affected packages to the latest versions to ensure security and stability. For detailed security statuses, users can consult the respective security tracker pages for each package. Additional information regarding Debian LTS advisories and how to apply updates can be found on the Debian Wiki.

Conclusion:
The updates reflect Debian's commitment to maintaining a secure operating environment by swiftly addressing vulnerabilities across critical software packages. Users should remain proactive in applying updates to safeguard their systems against potential threats

LibXML2, Expat, U-Boot, Jinja2, Firefox-ESR, VIPS, fig2dev, QEMU, Request Tracker updates for Debian

Debian GNU/Linux has been updated with multiple security enhancements, including LibXML2, Expat, Firefox-ESR, VIPS, fig2dev, and QEMU:

Debian GNU/Linux 8 (Jessie), 9 (Stretch), and 10 (Buster):
ELA-1412-1 libxml2 security update

Debian GNU/Linux 9 (Stretch) and 10 (Buster):
ELA-1411-1 expat security update

Debian GNU/Linux 11 (Bullseye) LTS:
[DLA 4146-1] libxml2 security update
[DLA 4145-1] expat security update
[DLA 4150-1] u-boot security update
[DLA 4149-1] nagvis security update
[DLA 4126-2] jinja2 regression update
[DLA 4148-1] vips security update
[DLA 4147-1] fig2dev security update
[DLA 4144-1] qemu security update

Debian GNU/Linux 12 (Bookworm):
[DSA 5911-1] request-tracker4 security update
[DSA 5909-1] request-tracker5 security update
[DSA 5910-1] firefox-esr security update

LibXML2, Expat, U-Boot, Jinja2, Firefox-ESR, VIPS, fig2dev, QEMU, Request Tracker updates for Debian @ Linux Compatible