Atualização Debian 13: 13.3 lançado

10 de Janeiro de 2026

O projeto Debian está feliz em anunciar a terceira atualização de sua versão estável (stable) do Debian 13 (codinome trixie). Esta versão pontual adiciona principalmente correções para problemas de segurança, além de pequenos ajustes para problemas mais sérios. Avisos de segurança já foram publicados em separado e são referenciados quando necessário.

Por favor, note que a versão pontual não constitui uma nova versão do Debian 13, mas apenas atualiza alguns dos pacotes já incluídos. Não há necessidade de jogar fora as antigas mídias da trixie. Após a instalação, os pacotes podem ser atualizados para as versões atuais usando um espelho atualizado do Debian.

Aquelas pessoas que frequentemente instalam atualizações a partir de security.debian.org não terão que atualizar muitos pacotes, e a maioria de tais atualizações estão incluídas na versão pontual.

Novas imagens de instalação logo estarão disponíveis nos locais habituais.

A atualização de uma instalação existente para esta revisão pode ser feita apontando o sistema de gerenciamento de pacotes para um dos muitos espelhos HTTP do Debian. Uma lista abrangente de espelhos está disponível em:

https://www.debian.org/mirror/list

Correções gerais de bugs

Esta atualização da versão estável (stable) adiciona algumas correções importantes para os seguintes pacotes:

Pacote Justificativa
ansible New upstream stable release
apache2 New upstream stable release; fix integer overflow issue [CVE-2025-55753]; don't pass querystring to #exec directives [CVE-2025-58098]; fix improper parsing of environment variables [CVE-2025-65082]; fix mod_userdir+suexec bypass issue [CVE-2025-66200]
at-spi2-core Ensure xkb group is taken into account for key events
awffull Fix systemd timer invocation to avoid premature cron-script exit
base-files Update for the point release
bash Rebuild with updated glibc
bglibs Rebuild with updated glibc
busybox Rebuild with updated glibc
calibre Fix FB2 embedded binary handling in conversion plugin [CVE-2025-64486]
catatonit Rebuild with updated glibc
cdebootstrap Rebuild with updated glibc
chkrootkit Rebuild with updated glibc
cloud-init Ensure deb822 sources.list template renders correctly
composer Fix ANSI sequence injection [CVE-2025-67746]
condor Rebuild with updated glibc
cups-filters Fix TIFF parser bounds/validation issues [CVE-2025-57812]; clamp oversized PDF MediaBox-derived page size in pdftoraster [CVE-2025-64503]; avoid rastertopclx infinite loop and heap overflow on crafted raster input [CVE-2025-64524]
dar Rebuild with updated curl, glibc, openssl
debian-installer Increase Linux kernel ABI to 6.12.63+deb13; rebuild against proposed updates
debian-installer-netboot-images Rebuild against proposed-updates
debian-security-support Mark hdf5 and zabbix as receiving limited support; mark wpewebkit as unsupported
debos Move systemd-resolved from Recommends to Depends
dgit git-debrebase: use different directory for nested workareas
dhcpcd Re-enable ntp_servers option by default
diffoscope Fix tests when ukify is newer
distribution-gpg-keys Update included keys
distrobuilder Rebuild with updated containerd, incus
docker.io Rebuild with updated containerd, glibc
dpdk New upstream stable release
e2fsprogs Rebuild with updated glibc
edk2 Fix timing side-channel issue in ECDSA signature computation [CVE-2024-13176]; fix out-of-bounds memory access issue [CVE-2024-38805]; fix code execution issue [CVE-2025-3770]
exfatprogs Ensure mkfs.exfat defaults to 512-byte sectors for Windows compatibility
extrepo-data Update repository information; fix handling for future Debian releases
flatpak New upstream stable release
fpdf2 Fix use of variable fonts
freedombox distupgrade: Handle comments in sources.list file; update trixie's release date; backups: Set proper permissions for backups-data directory [CVE-2025-68462]
freeradius Fix TLS verification segfault when certificate chains include multiple intermediate certificates
glib2.0 Fix various integer overflow issues [CVE-2025-13601 CVE-2025-14087 CVE-2025-14512]
glibc Fix a double lock init issue after fork(); fix SYSCALL_CANCEL for return values larger than INT_MAX; fix crash in ifunc functions on arm64 when hardening with -ftrivial-auto-var-init=zero; fix _dl_find_object when ld.so has LOAD segment gaps, causing wrong backtrace unwinding; optimize inverse trig function, SVE exp, hyperbolic, and log1p functions on arm64
gnome-shell New upstream bugfix release
gnupg2 Avoid potential downgrade to SHA1 in 3rd party key signatures; error out on unverified output for non-detached signatures; fix possible memory corruption in the armor parser [CVE-2025-68973]; do not use a default when asking for another output filename; rebuild with updated glibc
gnutls28 Fix PKCS#11 token label bounds in gnutls_pkcs11_token_init [CVE-2025-9820]; initialise PKCS#11 modules in thread-safe mode with fallback
golang-github-awslabs-soci-snapshotter Rebuild with updated containerd
golang-github-containerd-imgcrypt Rebuild with updated containerd
golang-github-containerd-nydus-snapshotter Rebuild with updated containerd
golang-github-containerd-stargz-snapshotter Rebuild with updated containerd
golang-github-containers-buildah Rebuild with updated containerd
golang-github-openshift-imagebuilder Rebuild with updated containerd
imagemagick Fix denial of service issues [CVE-2025-62594 CVE-2025-68618]; fix use-after-free issue [CVE-2025-65955]; fix integer overflow issues [CVE-2025-66628 CVE-2025-69204]; fix infinite loop issue [CVE-2025-68950]
incus Fix AppArmor profile generation for nested containers
integrit Rebuild with updated glibc
intel-microcode Update Intel processor microcode to 20251111
iperf3 Fix authentication RSA encryption buffer length initialisation for OpenSSL 3.5.3+; avoid build failures with newer OpenSSL
kleopatra Fix failure to start with a file argument on GNOME
libcap2 Rebuild with updated glibc
libcoap3 Fix configuration file parsing issue [CVE-2025-59391]; fix NULL pointer dereference issues [CVE-2025-65493 CVE-2025-65494 CVE-2025-65496 CVE-2025-65497 CVE-2025-65498 CVE-2025-65500 CVE-2025-65501]; fix integer signedness issue [CVE-2025-65495]; fix array index error issue [CVE-2025-65499]
libcupsfilters Fix TIFF parser bounds/validation issues [CVE-2025-57812]; clamp oversized PDF MediaBox-derived page size in pdftoraster [CVE-2025-64503]
libphp-adodb Fix SQL injection issue in sqlite(3) drivers [CVE-2025-54119]
libreoffice Set Bulgaria locale default currency to EUR
libvirt Perform ACL checks earlier, preventing malicious users from potentially being able to crash the daemon [CVE-2025-12748]; ensure that newly-created snapshots are not world-readable [CVE-2025-13193]; apply the detect_zeroes settings across all layers of the backing chain instead of just the topmost one
linux New upstream stable release
linux-signed-amd64 New upstream stable release
linux-signed-arm64 New upstream stable release
lua-wsapi Fix Lua 5.1 support
lxc Add lxc-net dependency to sysvinit script; stop printing misleading errors in enter_net_ns(); fix generation of apparmor.d/abstractions/lxc/container-base; fix restarting unprivileged containers
lxd Fix broken idmapping with kernel 6.9+; tighten storage pool volume permissions [CVE-2025-64507]
matlab-support Avoid renaming MATLAB vendored Vulkan/FreeType libraries
mbedtls New upstream stable release; fix timing issues [CVE-2025-54764 CVE-2025-59438]
mirrorbits Fix fallback redirects when Redis/file metadata is unavailable; normalise fallback mirror URLs to avoid malformed redirects
mongo-c-driver Avoid invalid memory reads [CVE-2025-12119]
mutter New upstream bugfix release
node-nodemailer Fix addressparser recipient parsing for quoted nested addresses [CVE-2025-13033]
openconnect Respect path in AnyConnect/OpenConnect XML form handling; fix failure to build with MinGW32/64; use RFC9266 'tls-exporter' channel bindings for Cisco STRAP with TLSv1.3
pgbouncer Fix arbitary SQL execution issue [CVE-2025-12819]
podman Rebuild with updated containerd
postgresql-17 New upstream stable release; check for CREATE privileges on the schema in CREATE STATISTICS [CVE-2025-12817]; avoid integer overflow in allocation-size calculations within libpq [CVE-2025-12818]
pylint-django Fix use with new astroid
qemu New upstream stable release; fix use after free issue [CVE-2025-11234]; fix buffer overflow issue [CVE-2025-12464]
qiv Fix Wayland startup crash by forcing X11 GDK backend
r-bioc-beachmat Fix test that depends on the beachmat.hdf5 R package, which is not yet in Debian
r-cran-gh Fix exposure of request headers in returned response objects [CVE-2025-54956]; ensure pagination passes authentication context explicitly; update tests and documentation
reform-tools Fix building lpc with Linux >= 6.17
rlottie Fix outlying coordinate rejection in FreeType rasteriser [CVE-2025-0634 CVE-2025-53074 CVE-2025-53075]
rsync Fix out-of-bounds read via negative array index in sender file list handling [CVE-2025-10158]
rust-repro-env Rebuild with updated rust-sequoia-openpgp
rust-ripasso-cursive Rebuild with updated rust-sequoia-openpgp
rust-sequoia-chameleon-gnupg Rebuild with updated rust-sequoia-openpgp
rust-sequoia-git Rebuild with updated rust-sequoia-openpgp
rust-sequoia-keystore-server Rebuild with updated rust-sequoia-openpgp
rust-sequoia-octopus-librnp Rebuild with updated rust-sequoia-openpgp
rust-sequoia-openpgp Fix buffer underflow in aes_key_unwrap [CVE-2025-67897]
rust-sequoia-sop Rebuild with updated rust-sequoia-openpgp
rust-sequoia-sq Rebuild with updated rust-sequoia-openpgp
rust-sequoia-sqv Rebuild with updated rust-sequoia-openpgp
sash Rebuild with updated glibc
sbuild Explicitly select the sbuild-build-depends-main-dummy package architecture; preserve TMPDIR when running autopkgtest; lib/Sbuild/Build.pm: preserve TMPDIR for piuparts; obey $TMPDIR for autopkgtest dsc mkdtemp
snapd Rebuild with updated glibc
sogo Fix cross-site scripting issues [CVE-2025-63498 CVE-2025-63499]
suricata Fix verdict logging bounds checks [CVE-2025-64330]; fix various logging stack overflows [CVE-2025-64331 CVE-2025-64332 CVE-2025-64333 CVE-2025-64344]
survex Fix the width of the find stations search box to make it actually usable again
swupdate Fix suricatta reboot-mode signalling via progress interface
symfony Fix PATH_INFO parsing [CVE-2025-64500]; drop failing Finder testsuite data entries
tini Rebuild with updated glibc
tripwire Rebuild with updated glibc
tsocks Rebuild with updated glibc
tzsetup Fix timezone for Argentina and Ukraine
user-mode-linux Rebuild with Linux 6.12.63-1
yorick-gy Fix GIR module version loading for Gtk/Gdk; switch to multiarch-friendly libgirepository-1.0-dev build-dependency; incorporate GCC-14/15 build fixes; update watch file and metadata
zsh Rebuild with updated glibc, pcre

Atualizações de segurança

Esta revisão adiciona as seguintes atualizações de segurança para a versão estável (stable). A equipe de segurança já lançou um aviso para cada uma dessas atualizações:

ID do aviso Pacote
DSA-6041 strongswan
DSA-6051 incus
DSA-6052 rust-sudo-rs
DSA-6055 chromium
DSA-6056 keystone
DSA-6056 swift
DSA-6058 lasso
DSA-6059 thunderbird
DSA-6060 chromium
DSA-6061 tryton-sao
DSA-6062 pdfminer
DSA-6063 kdeconnect
DSA-6064 tryton-server
DSA-6065 krita
DSA-6066 gnome-shell-extension-gsconnect
DSA-6067 containerd
DSA-6068 xen
DSA-6069 openvpn
DSA-6070 webkit2gtk
DSA-6071 unbound
DSA-6072 chromium
DSA-6073 ffmpeg
DSA-6074 webkit2gtk
DSA-6076 libpng1.6
DSA-6077 pdns-recursor
DSA-6080 chromium
DSA-6081 thunderbird
DSA-6082 vlc
DSA-6083 webkit2gtk
DSA-6084 c-ares
DSA-6085 mediawiki
DSA-6086 dropbear
DSA-6087 roundcube
DSA-6089 chromium
DSA-6090 rails
DSA-6091 wordpress
DSA-6092 smb4k

Instalador do Debian

O instalador foi atualizado para incluir as correções incorporadas na versão estável (stable) pela versão pontual.

URLs

As listas completas dos pacotes que foram alterados por esta revisão:

https://deb.debian.org/debian/dists/trixie/ChangeLog

A atual versão estável (stable):

https://deb.debian.org/debian/dists/stable/

Atualizações propostas (proposed updates) para a versão estável (stable):

https://deb.debian.org/debian/dists/proposed-updates

Informações da versão estável (stable) (notas de lançamento, errata, etc):

https://www.debian.org/releases/stable/

Anúncios de segurança e informações:

https://www.debian.org/security/

Sobre o Debian

O projeto Debian é uma associação de desenvolvedores(as) de Software Livre que dedicam seu tempo e esforço como voluntários(as) para produzir o sistema operacional completamente livre Debian.

Informações de contato

Para mais informações, por favor visite as páginas web do Debian em https://www.debian.org/, envie um e-mail (em inglês) para <press@debian.org>, ou entre em contato (em inglês) com a equipe de lançamento da versão estável (stable) em <debian-release@lists.debian.org>.