Debian 10694 Published by

Debian has issued several security updates for various packages, including cups, libcpanel-json-xs-perl, libjson-xs-perl, imagemagick, and amanda. The cups package has been updated to fix two vulnerabilities that may result in authentication bypass or denial-of-service attacks, with fixes available for Debian 11 (Bullseye) LTS and older distributions. Other packages have also been updated, including libcpanel-json-xs-perl and libjson-xs-perl to fix integer buffer overflow vulnerabilities, and imagemagick to address multiple memory corruption vulnerabilities. Users are recommended to upgrade their packages to the latest versions to ensure security.

Debian GNU/Linux9 (Stretch) Extended LTS:
ELA-822-2 amanda regression update

Debian GNU/Linux 9 (Stretch) and 10 (Buster) Extended LTS:
ELA-1512-1 cups security update

Debian GNU/Linux 11 (Bullseye) LTS:
[DLA 4298-1] cups security update

Debian gNU/Linux 12 (Bookworm) and 13 (Trixie):
[DSA 6000-1] libcpanel-json-xs-perl security update
[DSA 5999-1] libjson-xs-perl security update
[DSA 5998-1] cups security update
[DSA 5997-1] imagemagick security update



[SECURITY] [DLA 4298-1] cups security update


- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4298-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Thorsten Alteholz
September 11, 2025 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : cups
Version : 2.3.3op2-3+deb11u10
CVE ID : CVE-2025-58060 CVE-2025-58364

Two vulnerabilities were discovered in cups, the Common UNIX Printing
System, which may result in authentication bypass with AuthType
Negotiate or in denial of service (daemon crash).

For Debian 11 bullseye, these problems have been fixed in version
2.3.3op2-3+deb11u10.

We recommend that you upgrade your cups packages.

For the detailed security status of cups please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/cups

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



[SECURITY] [DSA 6000-1] libcpanel-json-xs-perl security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-6000-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
September 11, 2025 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : libcpanel-json-xs-perl
CVE ID : CVE-2025-40929

Michael Hudak discovered a flaw in libcpanel-json-xs-perl, a module for
fast and correct serialising to JSON. An integer buffer overflow causing
a segfault when parsing specially crafted JSON, may allow an attacker to
mount a denial-of-service attack or cause other unspecified impact.

For the oldstable distribution (bookworm), this problem has been fixed
in version 4.35-1+deb12u1.

For the stable distribution (trixie), this problem has been fixed in
version 4.39-2~deb13u1.

We recommend that you upgrade your libcpanel-json-xs-perl packages.

For the detailed security status of libcpanel-json-xs-perl please refer
to its security tracker page at:
https://security-tracker.debian.org/tracker/libcpanel-json-xs-perl

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/


[SECURITY] [DSA 5999-1] libjson-xs-perl security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-5999-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
September 11, 2025 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : libjson-xs-perl
CVE ID : CVE-2025-40928

Michael Hudak discovered a flaw in libjson-xs-perl, a module for
manipulating JSON-formatted data. An integer buffer overflow causing a
segfault when parsing specially crafted JSON, may allow an attacker to
mount a denial-of-service attack or cause other unspecified impact.

For the oldstable distribution (bookworm), this problem has been fixed
in version 4.040-1~deb12u1.

For the stable distribution (trixie), this problem has been fixed in
version 4.040-1~deb13u1.

We recommend that you upgrade your libjson-xs-perl packages.

For the detailed security status of libjson-xs-perl please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/libjson-xs-perl

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/


[SECURITY] [DSA 5998-1] cups security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-5998-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
September 11, 2025 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : cups
CVE ID : CVE-2025-58060 CVE-2025-58364

Two vulnerabilities were discovered in cups, the Common UNIX Printing
System, which may result in authentication bypass with AuthType
Negotiate or in denial of service (daemon crash).

For the oldstable distribution (bookworm), these problems have been fixed
in version 2.4.2-3+deb12u9.

For the stable distribution (trixie), these problems have been fixed in
version 2.4.10-3+deb13u1.

We recommend that you upgrade your cups packages.

For the detailed security status of cups please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/cups

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/


[SECURITY] [DSA 5997-1] imagemagick security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-5997-1 security@debian.org
https://www.debian.org/security/ Bastien Roucaries
September 12, 2025 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : imagemagick
CVE ID : CVE-2025-55004 CVE-2025-55005 CVE-2025-55154 CVE-2025-55212
CVE-2025-55298 CVE-2025-57803 CVE-2025-57807
Debian Bug : 1111101 1111102 1111103 1111586 1111587 1112469 1114520

Multiple memory corruption vulnerbilities were discovered in imagemagick,
a software suit used for editing and manipulating digital images, which
could lead to information leak, denial of service, and potentially arbitrary
code execution.

For the oldstable distribution (bookworm), these problems have been fixed
in version 6.9.11.60+dfsg-1.6+deb12u4.

For the stable distribution (trixie), these problems have been fixed in
version 8:7.1.1.43+dfsg1-1+deb13u2.

We recommend that you upgrade your imagemagick packages.

For the detailed security status of imagemagick please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/imagemagick

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/


ELA-1512-1 cups security update


Package : cups
Version : 2.2.1-8+deb9u13 (stretch), 2.2.10-6+deb10u12 (buster)

Related CVEs :
CVE-2025-58060
CVE-2025-58364

Two vulnerabilities were discovered in cups, the Common UNIX Printing
System, which may result in authentication bypass with AuthType
Negotiate or in denial of service (daemon crash).


ELA-1512-1 cups security update



ELA-822-2 amanda regression update


Package : amanda
Version : 1:3.3.9-5+deb9u3 (stretch)

A fix of CVE-2022-37704 for amanda, the Advanced Maryland Automatic Network Disk Archiver, has been found incomplete.
This update fixes handling of RSH environment variables and uses a correct check for dump/xfsdump.


ELA-822-2 amanda regression update