LibXSLT, PAM, Ceph, Chromium, Thunderbird updates for Debian

Published by

Debian has released several security advisories addressing vulnerabilities in various packages, including Chromium, LibXSLT, PAM, Thunderbird, and Ceph. The updates are crucial for maintaining system security and preventing potential exploits.

The most notable advisory is DSA-6010-1 for Chromium, which resolves three critical vulnerabilities that could allow for arbitrary code execution, denial of service, or information disclosure. Other advisories address vulnerabilities across the remaining packages, including issues related to key length, unauthorized access, and service interruptions.

For users on different versions of Debian:

- Debian GNU/Linux 9 (Stretch) and 10 (Buster): Security updates are available for LibXSLT (ELA-1525-1) and PAM (ELA-1522-1).
- Debian GNU/Linux 11 (Bullseye): Updates include security fixes for LibXSLT (DLA 4309-1) and Ceph (DLA 4310-1).
- Debian GNU/Linux 12 (Bookworm) and 13 (Trixie): Security updates for Chromium (DSA 6010-1) and Thunderbird (DSA 6011-1) have been released.

Specific Vulnerabilities Addressed

1. Chromium (CVE-2025-10890, CVE-2025-10891, CVE-2025-10892): These vulnerabilities could allow attackers to execute arbitrary code, disrupt service, or disclose sensitive information.

2. LibXSLT (CVE-2023-40403, CVE-2025-7424): Issues include potential information disclosure through deterministic values returned by the `generate-id()` function and a type confusion vulnerability that could lead to application crashes.

3. PAM (CVE-2024-22365, CVE-2025-6020): Vulnerabilities could allow denial of service attacks and unauthorized privilege escalation through improper path access.

4. Ceph (CVE-2021-3979, CVE-2022-3650, CVE-2023-43040, CVE-2025-52555): These flaws include issues with key length in encryption, privilege escalation through crash dumps, and unauthorized bucket access, potentially compromising system confidentiality and integrity.

5. Thunderbird (CVE-2025-10527 to CVE-2025-10537): A series of vulnerabilities could enable arbitrary code execution, leading to significant risks if left unaddressed.

Recommendations

Users are strongly advised to upgrade their respective packages to mitigate these risks. For detailed security statuses and guidance on applying updates, users can refer to the Debian security tracker pages for each package, and additional information can be found on the Debian website.

Conclusion

Staying current with security updates is essential for protecting systems from vulnerabilities that could be exploited by malicious actors. Debian users should prioritize these updates to ensure the integrity and security of their systems

LibXSLT, PAM, Ceph, Chromium, Thunderbird updates for Debian

Debian has issued multiple security advisories for various packages, including Chromium, LibXSLT, PAM, Thunderbird, and Ceph. The Chromium advisory (DSA-6010-1) fixes three vulnerabilities that could lead to arbitrary code execution, denial of service, or information disclosure. The other advisories address five vulnerabilities in the LibXSLT, PAM, Thunderbird, and Ceph packages, which include problems with key length, gaining unauthorized access, and causing service interruptions.

Debian GNU/Linux 9 (Stretch) and 10 (Buster) Extended LTS:
ELA-1525-1 libxslt security update
ELA-1522-1 pam security update

Debian GNU/Linux 11 (Bullseye) LTS:
[DLA 4309-1] libxslt security update
[DLA 4310-1] ceph security update

Debian GNU/Linux 12 (Bookworm) and 13 (Trixie):
[DSA 6010-1] chromium security update
[DSA 6011-1] thunderbird security update

LibXSLT, PAM, Ceph, Chromium, Thunderbird updates for Debian @ Linux Compatible