Key updates include:
1. CUPS: Two critical vulnerabilities (CVE-2025-58060, CVE-2025-58364) were identified, which could allow authentication bypass and cause the CUPS daemon to crash. These issues have been fixed in the latest versions for Debian 11 (Bullseye) and older distributions, including Debian 9 (Stretch) and 10 (Buster).
2. Libcpanel-json-xs-perl: An integer buffer overflow vulnerability (CVE-2025-40929) was discovered, which could lead to denial-of-service attacks. It has been patched for Debian 12 (Bookworm) and 13 (Trixie) in the latest updates.
3. Libjson-xs-perl: Similar to Libcpanel, an integer buffer overflow (CVE-2025-40928) was found in this package, also leading to potential denial-of-service vulnerabilities. The issue has been resolved in the recent updates for both Bookworm and Trixie.
4. ImageMagick: Multiple memory corruption vulnerabilities (CVE-2025-55004, CVE-2025-55005, CVE-2025-55154, CVE-2025-55212, CVE-2025-55298, CVE-2025-57803, CVE-2025-57807) were identified, potentially allowing for information leaks, denial of service, and arbitrary code execution. The necessary fixes are included in the latest versions for both Bookworm and Trixie.
5. Amanda: A regression update (ELA-822-2) was made for Amanda to address an incomplete fix of CVE-2022-37704, which involved proper handling of RSH environment variables.
For users of Debian, it is crucial to follow these updates to maintain system security and integrity. The Debian Security Tracker provides detailed information about the vulnerabilities and their resolutions, and users can refer to official Debian resources for guidance on applying these updates.
As the digital landscape evolves, and cyber threats become increasingly sophisticated, keeping software up to date is essential for protecting systems from potential exploits. Regular monitoring of security advisories and prompt application of updates will help ensure a secure computing environment for all Debian users
Amanda, CUPS, Libcpanel, Libjson, ImageMagick updates for Debian
Debian has issued several security updates for various packages, including cups, libcpanel-json-xs-perl, libjson-xs-perl, imagemagick, and amanda. The cups package has been updated to fix two vulnerabilities that may result in authentication bypass or denial-of-service attacks, with fixes available for Debian 11 (Bullseye) LTS and older distributions. Other packages have also been updated, including libcpanel-json-xs-perl and libjson-xs-perl to fix integer buffer overflow vulnerabilities, and imagemagick to address multiple memory corruption vulnerabilities. Users are recommended to upgrade their packages to the latest versions to ensure security.
Debian GNU/Linux9 (Stretch) Extended LTS:
ELA-822-2 amanda regression update
Debian GNU/Linux 9 (Stretch) and 10 (Buster) Extended LTS:
ELA-1512-1 cups security update
Debian GNU/Linux 11 (Bullseye) LTS:
[DLA 4298-1] cups security update
Debian gNU/Linux 12 (Bookworm) and 13 (Trixie):
[DSA 6000-1] libcpanel-json-xs-perl security update
[DSA 5999-1] libjson-xs-perl security update
[DSA 5998-1] cups security update
[DSA 5997-1] imagemagick security updateAmanda, CUPS, Libcpanel, Libjson, ImageMagick updates for Debian @ Linux Compatible