Security Information

Experience has shown that security through obscurity never works. Therefore, public disclosure allows for quicker and better solutions of security problems. In that respect, this page addresses Debian's status regarding various known security holes, which could potentially affect the Debian operating system.

The Debian project coordinates many security advisories with other free software vendors, and as a result, these advisories are published the same day a vulnerability is made public. In order to receive the latest Debian security advisories, please subscribe to the debian-security-announce mailing list.

Debian also participates in security standardization efforts:

Keeping your Debian System secure

The packages unattended-upgrades is installed with the GNOME desktop and keeps the computer current with the latest security (and other) updates automatically. The wiki entry has more detailed information how to manually set up unattended-upgrades.

For more information about security issues in Debian, please refer to our FAQ and our documentation:

Recent Advisories

These are the recent Debian Security Advisories (DSA) posted to the debian-security-announce list.
T is the link to the Debian Security Tracker information, the DSA number links to the announcement mail.

[22 Sep 2023] TDSA 5504-1 bind9 security update
[20 Sep 2023] TDSA 5503-1 netatalk security update
[18 Sep 2023] TDSA 5502-1 xrdp security update
[18 Sep 2023] TDSA 5501-1 gnome-shell security update
[18 Sep 2023] TDSA 5500-1 flac security update
[18 Sep 2023] TDSA 5499-1 chromium security update
[13 Sep 2023] TDSA 5497-2 libwebp security update
[15 Sep 2023] TDSA 5498-1 thunderbird security update
[13 Sep 2023] TDSA 5497-1 libwebp security update
[13 Sep 2023] TDSA 5496-1 firefox-esr security update
[11 Sep 2023] TDSA 5495-1 frr security update
[10 Sep 2023] TDSA 5494-1 mutt security update
[10 Sep 2023] TDSA 5493-1 open-vm-tools security update
[09 Sep 2023] TDSA 5492-1 linux security update
[07 Sep 2023] TDSA 5491-1 chromium security update
[06 Sep 2023] TDSA 5490-1 aom security update
[04 Sep 2023] TDSA 5489-1 file security update
[03 Sep 2023] TDSA 5488-1 thunderbird security update
[31 Aug 2023] TDSA 5487-1 chromium security update
[30 Aug 2023] TDSA 5486-1 json-c security update
[30 Aug 2023] TDSA 5485-1 firefox-esr security update
[27 Aug 2023] TDSA 5484-1 librsvg security update
[25 Aug 2023] TDSA 5483-1 chromium security update
[24 Aug 2023] TDSA 5482-1 tryton-server security update
[20 Aug 2023] TDSA 5481-1 fastdds security update
[18 Aug 2023] TDSA 5480-1 linux security update
[17 Aug 2023] TDSA 5479-1 chromium security update
[16 Aug 2023] TDSA 5478-1 openjdk-11 security update
[14 Aug 2023] TDSA 5477-1 samba security update
[12 Aug 2023] TDSA 5476-1 gst-plugins-ugly1.0 security update
[11 Aug 2023] TDSA 5475-1 linux security update
[11 Aug 2023] TDSA 5474-1 intel-microcode security update
[08 Aug 2023] TDSA 5473-1 orthanc security update
[08 Aug 2023] TDSA 5472-1 cjose security update
[07 Aug 2023] TDSA 5471-1 libhtmlcleaner-java security update
[06 Aug 2023] TDSA 5470-1 python-werkzeug security update
[05 Aug 2023] TDSA 5469-1 thunderbird security update
[05 Aug 2023] TDSA 5468-1 webkit2gtk security update
[04 Aug 2023] TDSA 5467-1 chromium security update
[04 Aug 2023] TDSA 5466-1 ntpsec security update
[03 Aug 2023] TDSA 5465-1 python-django security update
[03 Aug 2023] TDSA 5464-1 firefox-esr security update
[30 Jul 2023] TDSA 5463-1 thunderbird security update
[30 Jul 2023] TDSA 5462-1 linux security update
[30 Jul 2023] TDSA 5461-1 linux security update
[26 Jul 2023] TDSA 5460-1 curl security update
[25 Jul 2023] TDSA 5459-1 amd64-microcode security update
[25 Jul 2023] TDSA 5458-1 openjdk-17 security update
[22 Jul 2023] TDSA 5457-1 webkit2gtk security update
[20 Jul 2023] TDSA 5456-1 chromium security update
[17 Jul 2023] TDSA 5455-1 iperf3 security update

Sources of Security Information

The latest Debian security advisories are available as RDF files. We also offer a slightly longer version of the files which includes the first paragraph of the corresponding advisory.