Amanda, CUPS, Libcpanel, Libjson, ImageMagick updates for Debian

Published by

Debian has recently released a series of important security updates for several packages, including CUPS (Common UNIX Printing System), Libcpanel, Libjson, and ImageMagick. These updates address various vulnerabilities that could potentially be exploited, leading to authentication bypass, denial-of-service attacks, and memory corruption issues. Users are strongly advised to upgrade their packages to the latest versions to enhance security.

Key updates include:

1. CUPS: Two critical vulnerabilities (CVE-2025-58060, CVE-2025-58364) were identified, which could allow authentication bypass and cause the CUPS daemon to crash. These issues have been fixed in the latest versions for Debian 11 (Bullseye) and older distributions, including Debian 9 (Stretch) and 10 (Buster).

2. Libcpanel-json-xs-perl: An integer buffer overflow vulnerability (CVE-2025-40929) was discovered, which could lead to denial-of-service attacks. It has been patched for Debian 12 (Bookworm) and 13 (Trixie) in the latest updates.

3. Libjson-xs-perl: Similar to Libcpanel, an integer buffer overflow (CVE-2025-40928) was found in this package, also leading to potential denial-of-service vulnerabilities. The issue has been resolved in the recent updates for both Bookworm and Trixie.

4. ImageMagick: Multiple memory corruption vulnerabilities (CVE-2025-55004, CVE-2025-55005, CVE-2025-55154, CVE-2025-55212, CVE-2025-55298, CVE-2025-57803, CVE-2025-57807) were identified, potentially allowing for information leaks, denial of service, and arbitrary code execution. The necessary fixes are included in the latest versions for both Bookworm and Trixie.

5. Amanda: A regression update (ELA-822-2) was made for Amanda to address an incomplete fix of CVE-2022-37704, which involved proper handling of RSH environment variables.

For users of Debian, it is crucial to follow these updates to maintain system security and integrity. The Debian Security Tracker provides detailed information about the vulnerabilities and their resolutions, and users can refer to official Debian resources for guidance on applying these updates.

As the digital landscape evolves, and cyber threats become increasingly sophisticated, keeping software up to date is essential for protecting systems from potential exploits. Regular monitoring of security advisories and prompt application of updates will help ensure a secure computing environment for all Debian users

Amanda, CUPS, Libcpanel, Libjson, ImageMagick updates for Debian

Debian has issued several security updates for various packages, including cups, libcpanel-json-xs-perl, libjson-xs-perl, imagemagick, and amanda. The cups package has been updated to fix two vulnerabilities that may result in authentication bypass or denial-of-service attacks, with fixes available for Debian 11 (Bullseye) LTS and older distributions. Other packages have also been updated, including libcpanel-json-xs-perl and libjson-xs-perl to fix integer buffer overflow vulnerabilities, and imagemagick to address multiple memory corruption vulnerabilities. Users are recommended to upgrade their packages to the latest versions to ensure security.

Debian GNU/Linux9 (Stretch) Extended LTS:
ELA-822-2 amanda regression update

Debian GNU/Linux 9 (Stretch) and 10 (Buster) Extended LTS:
ELA-1512-1 cups security update

Debian GNU/Linux 11 (Bullseye) LTS:
[DLA 4298-1] cups security update

Debian gNU/Linux 12 (Bookworm) and 13 (Trixie):
[DSA 6000-1] libcpanel-json-xs-perl security update
[DSA 5999-1] libjson-xs-perl security update
[DSA 5998-1] cups security update
[DSA 5997-1] imagemagick security update

Amanda, CUPS, Libcpanel, Libjson, ImageMagick updates for Debian @ Linux Compatible