Mercurial, libblockdev, gst-plugins-bad1.0, libblockdev, Python 2.7, and Python-Django updates for Debian

Published by

Debian GNU/Linux has released critical security updates for various software packages, including Mercurial, libblockdev, gst-plugins-bad1.0, Python 2.7, and Python-Django. These updates are part of the Extended Long Term Support (LTS) for Debian GNU/Linux 9 (Stretch), 10 (Buster), and 11 (Bullseye).

Key Updates:
1. Mercurial:
- A security vulnerability (CVE-2025-2361) was identified in hgweb, the web interface of Mercurial, which allows for cross-site scripting attacks. This update not only addresses this vulnerability but also stabilizes test suites.

2. libblockdev:
- Multiple updates were issued for libblockdev across different Debian versions due to a local privilege escalation vulnerability (CVE-2025-6019) that could allow an "allow_active" user to gain root privileges via the udisks daemon.

3. gst-plugins-bad1.0:
- A stack buffer overflow in the H.265 codec parser was fixed, which could potentially lead to exploitation.

4. Python 2.7 and Python-Django:
- Regression updates for Python 2.7 (ELA-1348-2 and ELA-1347-2) were implemented to restore previous behavior after a fix led to unintended changes.
- Python-Django updates (ELA-1458-1) addressed vulnerabilities that could lead to denial-of-service attacks, including issues in text truncation and HTML tag handling.

5. Konsole:
- A critical update was issued for the KDE terminal emulator (DLA-4220-1) to fix a potential remote code execution vulnerability (CVE-2025-49091) when loading URLs from scheme handlers.

Recommendations:
Users are strongly advised to upgrade their packages for Mercurial, libblockdev, gst-plugins-bad1.0, Python 2.7, Python-Django, and Konsole to ensure their systems remain secure. Detailed security statuses and guidance on applying these updates can be found on Debian's security tracker and LTS advisory pages.

Extended Considerations:
In addition to applying these updates, users should regularly monitor Debian's security advisories and track updates for their installed packages. It is also advisable for users to consider migrating from Python 2.7, as it has reached its end of life, and to ensure they are using supported versions of Debian to benefit from ongoing security updates. Transitioning to newer frameworks within Python can help mitigate vulnerabilities and improve overall system security

Mercurial, libblockdev, gst-plugins-bad1.0, libblockdev, Python 2.7, and Python-Django updates for Debian

Debian GNU/Linux has undergone a series of security updates, encompassing Mercurial, libblockdev, gst-plugins-bad1.0, libblockdev, Python 2.7, and Python-Django:

Debian GNU/Linux 9 (Stretch) Extended LTS:
ELA-1348-2 python2.7 regression update

Debian GNU/Linux 9 (Stretch) and 10 (Buster) Extended LTS:
ELA-1463-1 mercurial security update
ELA-1464-1 gst-plugins-bad1.0 security update
ELA-1458-1 python-django security update

Debian GNU/Linux 10 (Buster) Extended LTS:
[DSA 5943-1] libblockdev security update
ELA-1465-1 libblockdev security update
ELA-1347-2 python2.7 regression update

Debian GNU/Linux 11 (Bullseye) Extended LTS:
[DLA 4220-1] konsole security update
[DLA 4221-1] libblockdev security update
[DLA 4219-1] gst-plugins-bad1.0 security update

Mercurial, libblockdev, gst-plugins-bad1.0, libblockdev, Python 2.7, and Python-Django updates for Debian @ Linux Compatible