Debian GNU/Linux9 (Stretch) Extended LTS:
ELA-822-2 amanda regression update
Debian GNU/Linux 9 (Stretch) and 10 (Buster) Extended LTS:
ELA-1512-1 cups security update
Debian GNU/Linux 11 (Bullseye) LTS:
[DLA 4298-1] cups security update
Debian gNU/Linux 12 (Bookworm) and 13 (Trixie):
[DSA 6000-1] libcpanel-json-xs-perl security update
[DSA 5999-1] libjson-xs-perl security update
[DSA 5998-1] cups security update
[DSA 5997-1] imagemagick security update
[SECURITY] [DLA 4298-1] cups security update
- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4298-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Thorsten Alteholz
September 11, 2025 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : cups
Version : 2.3.3op2-3+deb11u10
CVE ID : CVE-2025-58060 CVE-2025-58364
Two vulnerabilities were discovered in cups, the Common UNIX Printing
System, which may result in authentication bypass with AuthType
Negotiate or in denial of service (daemon crash).
For Debian 11 bullseye, these problems have been fixed in version
2.3.3op2-3+deb11u10.
We recommend that you upgrade your cups packages.
For the detailed security status of cups please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/cups
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
[SECURITY] [DSA 6000-1] libcpanel-json-xs-perl security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-6000-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
September 11, 2025 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : libcpanel-json-xs-perl
CVE ID : CVE-2025-40929
Michael Hudak discovered a flaw in libcpanel-json-xs-perl, a module for
fast and correct serialising to JSON. An integer buffer overflow causing
a segfault when parsing specially crafted JSON, may allow an attacker to
mount a denial-of-service attack or cause other unspecified impact.
For the oldstable distribution (bookworm), this problem has been fixed
in version 4.35-1+deb12u1.
For the stable distribution (trixie), this problem has been fixed in
version 4.39-2~deb13u1.
We recommend that you upgrade your libcpanel-json-xs-perl packages.
For the detailed security status of libcpanel-json-xs-perl please refer
to its security tracker page at:
https://security-tracker.debian.org/tracker/libcpanel-json-xs-perl
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
[SECURITY] [DSA 5999-1] libjson-xs-perl security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5999-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
September 11, 2025 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : libjson-xs-perl
CVE ID : CVE-2025-40928
Michael Hudak discovered a flaw in libjson-xs-perl, a module for
manipulating JSON-formatted data. An integer buffer overflow causing a
segfault when parsing specially crafted JSON, may allow an attacker to
mount a denial-of-service attack or cause other unspecified impact.
For the oldstable distribution (bookworm), this problem has been fixed
in version 4.040-1~deb12u1.
For the stable distribution (trixie), this problem has been fixed in
version 4.040-1~deb13u1.
We recommend that you upgrade your libjson-xs-perl packages.
For the detailed security status of libjson-xs-perl please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/libjson-xs-perl
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
[SECURITY] [DSA 5998-1] cups security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5998-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
September 11, 2025 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : cups
CVE ID : CVE-2025-58060 CVE-2025-58364
Two vulnerabilities were discovered in cups, the Common UNIX Printing
System, which may result in authentication bypass with AuthType
Negotiate or in denial of service (daemon crash).
For the oldstable distribution (bookworm), these problems have been fixed
in version 2.4.2-3+deb12u9.
For the stable distribution (trixie), these problems have been fixed in
version 2.4.10-3+deb13u1.
We recommend that you upgrade your cups packages.
For the detailed security status of cups please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/cups
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
[SECURITY] [DSA 5997-1] imagemagick security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5997-1 security@debian.org
https://www.debian.org/security/ Bastien Roucaries
September 12, 2025 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : imagemagick
CVE ID : CVE-2025-55004 CVE-2025-55005 CVE-2025-55154 CVE-2025-55212
CVE-2025-55298 CVE-2025-57803 CVE-2025-57807
Debian Bug : 1111101 1111102 1111103 1111586 1111587 1112469 1114520
Multiple memory corruption vulnerbilities were discovered in imagemagick,
a software suit used for editing and manipulating digital images, which
could lead to information leak, denial of service, and potentially arbitrary
code execution.
For the oldstable distribution (bookworm), these problems have been fixed
in version 6.9.11.60+dfsg-1.6+deb12u4.
For the stable distribution (trixie), these problems have been fixed in
version 8:7.1.1.43+dfsg1-1+deb13u2.
We recommend that you upgrade your imagemagick packages.
For the detailed security status of imagemagick please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/imagemagick
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
ELA-1512-1 cups security update
Package : cups
Version : 2.2.1-8+deb9u13 (stretch), 2.2.10-6+deb10u12 (buster)
Related CVEs :
CVE-2025-58060
CVE-2025-58364
Two vulnerabilities were discovered in cups, the Common UNIX Printing
System, which may result in authentication bypass with AuthType
Negotiate or in denial of service (daemon crash).ELA-1512-1 cups security update
ELA-822-2 amanda regression update
Package : amanda
Version : 1:3.3.9-5+deb9u3 (stretch)
A fix of CVE-2022-37704 for amanda, the Advanced Maryland Automatic Network Disk Archiver, has been found incomplete.
This update fixes handling of RSH environment variables and uses a correct check for dump/xfsdump.ELA-822-2 amanda regression update