The udisks2 package was identified to have an out-of-bounds read vulnerability (CVE-2025-8067), which could potentially lead to denial of service or local privilege escalation. This vulnerability has been resolved in the respective versions for each distribution: 2.9.4-4+deb12u2 for Bookworm, 2.10.1-12.1+deb13u1 for Trixie, and 2.9.2-2+deb11u3 for Bullseye.
Additionally, the golang-github-gin-contrib-cors package has a vulnerability (CVE-2019-25211) that allowed attackers to bypass CORS restrictions due to poor wildcard handling. This has been addressed in version 1.3.1-1+deb11u1 for Debian 11 Bullseye.
Users are advised to upgrade the affected packages to mitigate these security risks and safeguard their systems against potential exploits.
For further details, users can refer to the respective security tracker pages for each package and find guidance on applying these updates on the Debian security website and LTS wiki.
Extension:
Maintaining the security of software packages is crucial for ensuring the integrity and functionality of operating systems. The Debian community's prompt response to these vulnerabilities demonstrates their commitment to user safety. It is essential for system administrators and users to regularly check for updates and apply them promptly, as unaddressed vulnerabilities can lead to severe consequences, including unauthorized access, data breaches, and system crashes.
In addition to upgrading the affected packages, users should consider implementing additional security measures, such as regularly monitoring system logs for unusual activity, employing firewalls, and utilizing intrusion detection systems. Educating users about security best practices, including recognizing phishing attempts and ensuring secure coding practices when developing applications, can further bolster defenses against potential threats.
Moreover, users should stay informed about ongoing security developments within the Debian community and other software ecosystems to be proactive in managing security risks. Regularly reviewing security advisories and participating in security discussions can enhance one’s understanding of cybersecurity and its evolving nature
UDisks2 and GoLang-Github-Gin-Contrib-Cores updates for Debian
Debian Security Advisory DSA-5989-1 for Debian GNU/Linux 12 and 13 and Debian LTS advisories DLA 4285-1 and DLA 4284-1 for Debian GNU/Linux 11 LTS were issued to address security vulnerabilities in various packages. The udisks2 package was found to have an out-of-bounds read vulnerability (CVE-2025-8067) that could lead to denial of service or local privilege escalation, which has been fixed in versions 2.9.4-4+deb12u2 and 2.10.1-12.1+deb13u1 for the Bookworm and
Trixie distributions, respectively, as well as in version 2.9.2-2+deb11u3 for Debian 11 Bullseye. Additionally, an issue was found in golang-github-gin-contrib-cors (CVE-2019-25211) that could allow an attacker to circumvent CORS restrictions due to improper wildcard handling, which has been fixed in version 1.3.1-1+deb11u1 for Debian 11 Bullseye. It is recommended to upgrade the affected packages to fix these security vulnerabilities and prevent potential attacks.
[DSA 5989-1] udisks2 security update
[DLA 4285-1] golang-github-gin-contrib-cors security
[DLA 4284-1] udisks2 security updateUDisks2 and GoLang-Github-Gin-Contrib-Cores updates for Debian @ Linux Compatible