Update Now to Patch Critical Linux and Perl Vulnerabilities
Avoid privilege escalation, data leaks, and code execution,update to the latest Tails version immediately.

Tails 6.14.2 Released: Critical Security Fixes for Linux and Perl Update Immediately
This update isn't optional. Tails 6.14.2 fixes serious vulnerabilities in the Linux kernel and Perl interpreter that could lead to privilege escalation or remote code execution.
The Tails Project has released version 6.14.2, and it includes crucial security patches inherited from Debian. If you're running Tails, updating to this version is strongly advised especially if you rely on it for anonymous or high-risk use cases.
What’s Fixed in Tails 6.14.2?
This update applies two significant security patches:
🔒 Linux Kernel Updated to 6.1.133
This kernel bump incorporates fixes for dozens of CVEs, including vulnerabilities that could allow:
- Local privilege escalation
- Denial-of-service attacks
- Information disclosure
- Potential system compromise
Full list of vulnerabilities addressed:
Debian Security Advisory DSA-5900-1
🐪 Perl Updated to 5.36.0-7+deb12u2
Also patched is a heap-based buffer overflow vulnerability in Perl that could result in:
- Denial of service
- Arbitrary code execution in rare cases
Details here:
Debian Security Advisory DSA-5902-1
Why It Matters for Tails Users
Tails is built to protect your identity and maintain operational security. But these kinds of vulnerabilities can undermine that entire premise if left unpatched. Even with amnesia mode and Tor routing, a kernel-level or interpreter exploit can break containment or expose you to surveillance and compromise.
This isn’t a cosmetic or performance update it's a critical security patch.
What You Should Do Now
- Plug in your Tails USB
- Boot into Tails and connect to the internet
- Follow the standard upgrade procedure
- Verify you're running Tails 6.14.2
You can view the full changelog at:
https://tails.net/news/version_6.14.2/