The Debian project is pleased to announce the third update of its stable distribution Debian 13 (codename trixie). This point release mainly adds corrections for security issues, along with a few adjustments for serious problems. Security advisories have already been published separately and are referenced where available.
Please note that the point release does not constitute a new version of Debian 13 but only updates some of the packages included. There is no need to throw away old trixie media. After installation, packages can be upgraded to the current versions using an up-to-date Debian mirror.
Those who frequently install updates from security.debian.org won’t have to update many packages, and most such updates are included in the point release.
New installation images…
The Debian project is pleased to announce the third update of its stable distribution Debian 13 (codename trixie). This point release mainly adds corrections for security issues, along with a few adjustments for serious problems. Security advisories have already been published separately and are referenced where available.
Please note that the point release does not constitute a new version of Debian 13 but only updates some of the packages included. There is no need to throw away old trixie media. After installation, packages can be upgraded to the current versions using an up-to-date Debian mirror.
Those who frequently install updates from security.debian.org won’t have to update many packages, and most such updates are included in the point release.
New installation images will be available soon at the regular locations.
Upgrading an existing installation to this revision can be achieved by pointing the package management system at one of Debian’s many HTTP mirrors. A comprehensive list of mirrors is available at:
Package Reason ansible New upstream stable release apache2 New upstream stable release; fix integer overflow issue [CVE-2025-55753]; don’t pass querystring to #exec directives [CVE-2025-58098]; fix improper parsing of environment variables [CVE-2025-65082]; fix mod_userdir+suexec bypass issue [CVE-2025-66200] at-spi2-core Ensure xkb group is taken into account for key events awffull Fix systemd timer invocation to avoid premature cron-script exit base-files Update for the point release bash Rebuild with updated glibc bglibs Rebuild with updated glibc busybox Rebuild with updated glibc calibre Fix FB2 embedded binary handling in conversion plugin [CVE-2025-64486] catatonit Rebuild with updated glibc cdebootstrap Rebuild with updated glibc chkrootkit Rebuild with updated glibc cloud-init Ensure deb822 sources.list template renders correctly composer Fix ANSI sequence injection [CVE-2025-67746] condor Rebuild with updated glibc cups-filters Fix TIFF parser bounds/validation issues [CVE-2025-57812]; clamp oversized PDF MediaBox-derived page size in pdftoraster [CVE-2025-64503]; avoid rastertopclx infinite loop and heap overflow on crafted raster input [CVE-2025-64524] dar Rebuild with updated curl, glibc, openssl debian-installer Increase Linux kernel ABI to 6.12.63+deb13; rebuild against proposed updates debian-installer-netboot-images Rebuild against proposed-updates debian-security-support Mark hdf5 and zabbix as receiving limited support; mark wpewebkit as unsupported debos Move systemd-resolved from Recommends to Depends dgit git-debrebase: use different directory for nested workareas dhcpcd Re-enable ntp_servers option by default diffoscope Fix tests when ukify is newer distribution-gpg-keys Update included keys distrobuilder Rebuild with updated containerd, incus docker.io Rebuild with updated containerd, glibc dpdk New upstream stable release e2fsprogs Rebuild with updated glibc edk2 Fix timing side-channel issue in ECDSA signature computation [CVE-2024-13176]; fix out-of-bounds memory access issue [CVE-2024-38805]; fix code execution issue [CVE-2025-3770] exfatprogs Ensure mkfs.exfat defaults to 512-byte sectors for Windows compatibility extrepo-data Update repository information; fix handling for future Debian releases flatpak New upstream stable release fpdf2 Fix use of variable fonts freedombox distupgrade: Handle comments in sources.list file; update trixie’s release date; backups: Set proper permissions for backups-data directory [CVE-2025-68462] freeradius Fix TLS verification segfault when certificate chains include multiple intermediate certificates glib2.0 Fix various integer overflow issues [CVE-2025-13601 CVE-2025-14087 CVE-2025-14512] glibc Fix a double lock init issue after fork(); fix SYSCALL_CANCEL for return values larger than INT_MAX; fix crash in ifunc functions on arm64 when hardening with -ftrivial-auto-var-init=zero; fix _dl_find_object when ld.so has LOAD segment gaps, causing wrong backtrace unwinding; optimize inverse trig function, SVE exp, hyperbolic, and log1p functions on arm64 gnome-shell New upstream bugfix release gnupg2 Avoid potential downgrade to SHA1 in 3rd party key signatures; error out on unverified output for non-detached signatures; fix possible memory corruption in the armor parser [CVE-2025-68973]; do not use a default when asking for another output filename; rebuild with updated glibc gnutls28 Fix PKCS#11 token label bounds in gnutls_pkcs11_token_init [CVE-2025-9820]; initialise PKCS#11 modules in thread-safe mode with fallback golang-github-awslabs-soci-snapshotter Rebuild with updated containerd golang-github-containerd-imgcrypt Rebuild with updated containerd golang-github-containerd-nydus-snapshotter Rebuild with updated containerd golang-github-containerd-stargz-snapshotter Rebuild with updated containerd golang-github-containers-buildah Rebuild with updated containerd golang-github-openshift-imagebuilder Rebuild with updated containerd imagemagick Fix denial of service issues [CVE-2025-62594 CVE-2025-68618]; fix use-after-free issue [CVE-2025-65955]; fix integer overflow issues [CVE-2025-66628 CVE-2025-69204]; fix infinite loop issue [CVE-2025-68950] incus Fix AppArmor profile generation for nested containers integrit Rebuild with updated glibc intel-microcode Update Intel processor microcode to 20251111 iperf3 Fix authentication RSA encryption buffer length initialisation for OpenSSL 3.5.3+; avoid build failures with newer OpenSSL kleopatra Fix failure to start with a file argument on GNOME libcap2 Rebuild with updated glibc libcoap3 Fix configuration file parsing issue [CVE-2025-59391]; fix NULL pointer dereference issues [CVE-2025-65493 CVE-2025-65494 CVE-2025-65496 CVE-2025-65497 CVE-2025-65498 CVE-2025-65500 CVE-2025-65501]; fix integer signedness issue [CVE-2025-65495]; fix array index error issue [CVE-2025-65499] libcupsfilters Fix TIFF parser bounds/validation issues [CVE-2025-57812]; clamp oversized PDF MediaBox-derived page size in pdftoraster [CVE-2025-64503] libphp-adodb Fix SQL injection issue in sqlite(3) drivers [CVE-2025-54119] libreoffice Set Bulgaria locale default currency to EUR libvirt Perform ACL checks earlier, preventing malicious users from potentially being able to crash the daemon [CVE-2025-12748]; ensure that newly-created snapshots are not world-readable [CVE-2025-13193]; apply the detect_zeroes settings across all layers of the backing chain instead of just the topmost one linux New upstream stable release linux-signed-amd64 New upstream stable release linux-signed-arm64 New upstream stable release lua-wsapi Fix Lua 5.1 support lxc Add lxc-net dependency to sysvinit script; stop printing misleading errors in enter_net_ns(); fix generation of apparmor.d/abstractions/lxc/container-base; fix restarting unprivileged containers lxd Fix broken idmapping with kernel 6.9+; tighten storage pool volume permissions [CVE-2025-64507] matlab-support Avoid renaming MATLAB vendored Vulkan/FreeType libraries mbedtls New upstream stable release; fix timing issues [CVE-2025-54764 CVE-2025-59438] mirrorbits Fix fallback redirects when Redis/file metadata is unavailable; normalise fallback mirror URLs to avoid malformed redirects mongo-c-driver Avoid invalid memory reads [CVE-2025-12119] mutter New upstream bugfix release node-nodemailer Fix addressparser recipient parsing for quoted nested addresses [CVE-2025-13033] openconnect Respect path in AnyConnect/OpenConnect XML form handling; fix failure to build with MinGW32/64; use RFC9266 ‘tls-exporter’ channel bindings for Cisco STRAP with TLSv1.3 pgbouncer Fix arbitary SQL execution issue [CVE-2025-12819] podman Rebuild with updated containerd postgresql-17 New upstream stable release; check for CREATE privileges on the schema in CREATE STATISTICS [CVE-2025-12817]; avoid integer overflow in allocation-size calculations within libpq [CVE-2025-12818] pylint-django Fix use with new astroid qemu New upstream stable release; fix use after free issue [CVE-2025-11234]; fix buffer overflow issue [CVE-2025-12464] qiv Fix Wayland startup crash by forcing X11 GDK backend r-bioc-beachmat Fix test that depends on the beachmat.hdf5 R package, which is not yet in Debian r-cran-gh Fix exposure of request headers in returned response objects [CVE-2025-54956]; ensure pagination passes authentication context explicitly; update tests and documentation reform-tools Fix building lpc with Linux >= 6.17 rlottie Fix outlying coordinate rejection in FreeType rasteriser [CVE-2025-0634 CVE-2025-53074 CVE-2025-53075] rsync Fix out-of-bounds read via negative array index in sender file list handling [CVE-2025-10158] rust-repro-env Rebuild with updated rust-sequoia-openpgp rust-ripasso-cursive Rebuild with updated rust-sequoia-openpgp rust-sequoia-chameleon-gnupg Rebuild with updated rust-sequoia-openpgp rust-sequoia-git Rebuild with updated rust-sequoia-openpgp rust-sequoia-keystore-server Rebuild with updated rust-sequoia-openpgp rust-sequoia-octopus-librnp Rebuild with updated rust-sequoia-openpgp rust-sequoia-openpgp Fix buffer underflow in aes_key_unwrap [CVE-2025-67897] rust-sequoia-sop Rebuild with updated rust-sequoia-openpgp rust-sequoia-sq Rebuild with updated rust-sequoia-openpgp rust-sequoia-sqv Rebuild with updated rust-sequoia-openpgp sash Rebuild with updated glibc sbuild Explicitly select the sbuild-build-depends-main-dummy package architecture; preserve TMPDIR when running autopkgtest; lib/Sbuild/Build.pm: preserve TMPDIR for piuparts; obey $TMPDIR for autopkgtest dsc mkdtemp snapd Rebuild with updated glibc sogo Fix cross-site scripting issues [CVE-2025-63498 CVE-2025-63499] suricata Fix verdict logging bounds checks [CVE-2025-64330]; fix various logging stack overflows [CVE-2025-64331 CVE-2025-64332 CVE-2025-64333 CVE-2025-64344] survex Fix the width of the find stations search box to make it actually usable again swupdate Fix suricatta reboot-mode signalling via progress interface symfony Fix PATH_INFO parsing [CVE-2025-64500]; drop failing Finder testsuite data entries tini Rebuild with updated glibc tripwire Rebuild with updated glibc tsocks Rebuild with updated glibc tzsetup Fix timezone for Argentina and Ukraine user-mode-linux Rebuild with Linux 6.12.63-1 yorick-gy Fix GIR module version loading for Gtk/Gdk; switch to multiarch-friendly libgirepository-1.0-dev build-dependency; incorporate GCC-14/15 build fixes; update watch file and metadata zsh Rebuild with updated glibc, pcre
This revision adds the following security updates to the stable release. The Security Team has already released an advisory for each of these updates:
The installer has been updated to include the fixes incorporated into stable by the point release.
The Debian Project is an association of Free Software developers who volunteer their time and effort in order to produce the completely free operating system Debian.
For further information, please visit the Debian web pages at https://www.debian.org/, send mail to <press@debian.org>, or contact the stable release team at <debian-release@lists.debian.org>.