Debian 10264 Published by

The following two security updates have been released for Debian GNU/Linux 10 LTS (Buster):

[DLA 3825-1] firefox-esr security update
[DLA 3826-1] cups security update




[DLA 3825-1] firefox-esr security update


- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3825-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Emilio Pozuelo Monfort
June 13, 2024 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : firefox-esr
Version : 115.12.0esr-1~deb10u1
CVE ID : CVE-2024-5688 CVE-2024-5690 CVE-2024-5691 CVE-2024-5693
CVE-2024-5696 CVE-2024-5700 CVE-2024-5702

Multiple security issues have been found in the Mozilla Firefox web
browser, which could potentially result in the execution of arbitrary
code, the bypass of sandbox restrictions or an information leak.

For Debian 10 buster, these problems have been fixed in version
115.12.0esr-1~deb10u1.

We recommend that you upgrade your firefox-esr packages.

For the detailed security status of firefox-esr please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/firefox-esr

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



[DLA 3826-1] cups security update


- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3826-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Thorsten Alteholz
June 13, 2024 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : cups
Version : 2.2.10-6+deb10u10
CVE ID : CVE-2024-35235

An issue has been found in cups, the Common UNIX Printing System(tm).
When starting the cupsd server with a Listen configuration item pointing
to a symbolic link, the cupsd process can be caused to perform an
arbitrary chmod of the provided argument, providing world-writable access
to the target.

For Debian 10 buster, this problem has been fixed in version
2.2.10-6+deb10u10.

We recommend that you upgrade your cups packages.

For the detailed security status of cups please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/cups

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS