Experience has shown that
security through obscurity never works. Therefore, public disclosure allows for quicker and better solutions of security problems. In that respect, this page addresses Debian's status regarding various known security holes, which could potentially affect the Debian operating system.
The Debian project coordinates many security advisories with other free software vendors, and as a result, these advisories are published the same day a vulnerability is made public.
Debian also participates in security standardization efforts:
- The Debian Security Advisories are CVE-Compatible (review the cross references).
- Debian publishes its security information using the Open Vulnerability Assessment Language (OVAL)
In order to receive the latest Debian security advisories, please subscribe to the debian-security-announce mailing list.
On top of that, you can use APT to easily get the latest security updates. To keep your Debian operating system up-to-date with security patches, please add the following line to your
deb http://security.debian.org/debian-security bookworm-security main contrib non-free non-free-firmware
After saving the changes, run the following two commands to download and install the pending updates:
apt-get update && apt-get upgrade
The security archive is signed with the usual Debian archive keys.
For more information about security issues in Debian, please refer to our FAQ and our documentation:
These web pages include a condensed archive of security advisories posted to the debian-security-announce list.
(Check out the new list format.)
[01 Dec 2023] DSA-5571-1 rabbitmq-server security update
[01 Dec 2023] DSA-5570-1 nghttp2 security update
[30 Nov 2023] DSA-5569-1 chromium security update
[27 Nov 2023] DSA-5568-1 fastdds security update
[27 Nov 2023] DSA-5567-1 tiff security update
[26 Nov 2023] DSA-5566-1 thunderbird security update
[25 Nov 2023] DSA-5565-1 gst-plugins-bad1.0 security update
[24 Nov 2023] DSA-5564-1 gimp security update
[23 Nov 2023] DSA-5563-1 intel-microcode security update
[22 Nov 2023] DSA-5562-1 tor security update
[22 Nov 2023] DSA-5561-1 firefox-esr security update
[20 Nov 2023] DSA-5560-1 strongswan security update
[19 Nov 2023] DSA-5559-1 wireshark security update
[18 Nov 2023] DSA-5558-1 netty security update
[17 Nov 2023] DSA-5557-1 webkit2gtk security update
[15 Nov 2023] DSA-5556-1 chromium security update
[15 Nov 2023] DSA-5555-1 openvpn security update
[13 Nov 2023] DSA-5554-1 postgresql-13 security update
[13 Nov 2023] DSA-5553-1 postgresql-15 security update
[12 Nov 2023] DSA-5552-1 ffmpeg security update
[09 Nov 2023] DSA-5551-1 chromium security update
[08 Nov 2023] DSA-5550-1 cacti security update
[05 Nov 2023] DSA-5549-1 trafficserver security update
[05 Nov 2023] DSA-5548-1 openjdk-17 security update
[04 Nov 2023] DSA-5547-1 pmix security update
[02 Nov 2023] DSA-5546-1 chromium security update
[02 Nov 2023] DSA-5545-1 vlc security update
The latest Debian security advisories are available as RDF files. We also offer a slightly longer version of the files which includes the first paragraph of the corresponding advisory. That way you can easily spot what the advisory is about.
Older security advisories are also available: 2023, 2022, 2021, 2020, 2019, 2018, 2017, 2016, 2015, 2014, 2013, 2012, 2011, 2010, 2009, 2008, 2007, 2006, 2005, 2004, 2003, 2002, 2001, 2000, 1999, 1998, 1997 and undated security advisories, included for posterity.
Debian distributions are not vulnerable to all security problems. The Debian Security Tracker collects all information about the vulnerability status of Debian packages. It can be searched by CVE name or by package.