To mitigate this vulnerability, users are urged to upgrade their node-cipher-base packages to the following versions: 1.0.4-6+deb12u1 for the oldstable distribution (Bookworm) and 1.0.4-6+deb13u1 for the stable distribution (Trixie).
For more information, refer to the Debian Security Advisory DSA-5986-1, published on August 26, 2025, by Moritz Muehlenhoff. Users can also access the security tracker page for node-cipher-base for detailed security status and additional resources on applying updates through the Debian security website.
In light of the increasing number of security vulnerabilities in software packages, it is crucial for users and system administrators to remain vigilant about software updates and security advisories. Regularly checking for updates and applying them promptly can help protect systems from potential exploits and ensure the integrity of applications relying on these packages. Furthermore, users should consider implementing additional security measures, such as intrusion detection systems and regular security audits, to enhance their overall security posture
Node-Cipher-Base security update for Debian 12 and 13
A security update has been released for the node-cipher-base package in both Debian GNU/Linux 12 and 13. The vulnerability, identified as CVE-2025-9287, was discovered by Nikita Skorovoda and affects the Node cipher-base due to incomplete type checks. To fix this issue, users are advised to upgrade their node-cipher-base packages to version 1.0.4-6+deb12u1 for the oldstable distribution (Bookworm) or version 1.0.4-6+deb13u1 for the stable distribution (Trixie).
[DSA 5986-1] node-cipher-base security updateNode-Cipher-Base security update for Debian 12 and 13 @ Linux Compatible