Debian 10020 Published by

Updated bluez, tzdata, and ghostscript packages have been released for Debian GNU/Linux:

[DLA 3689-1] bluez security update
ELA-1020-1 tzdata security update
[DSA 5578-1] ghostscript security update




[DLA 3689-1] bluez security update


- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3689-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Chris Lamb
December 14, 2023 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : bluez
Version : 5.50-1.2~deb10u4
CVE ID : CVE-2023-45866
Debian Bug : 1057914

It was discovered that there was a keyboard injection attack in
Bluez, a set of services and tools for interacting with wireless
Bluetooth devices.

Prior to this change, BlueZ may have permitted an unauthenticated
peripherals to establish encrypted connections and thereby accept
keyboard reports, potentially permitting injection of HID (~keyboard)
commands, despite no user authorising such access.

For Debian 10 buster, this problem has been fixed in version
5.50-1.2~deb10u4.

We recommend that you upgrade your bluez packages.

For the detailed security status of bluez please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/bluez

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



ELA-1020-1 tzdata security update

Package : tzdata


Version : 2021a-0+deb8u11 (jessie), 2021a-0+deb9u11 (stretch)


This update includes the latest changes to the leap second list,
including an update to its expiry date, which was set for the end of
December.

ELA-1020-1 tzdata security update


[DSA 5578-1] ghostscript security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-5578-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
December 15, 2023 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : ghostscript
CVE ID : CVE-2023-46751

It was discovered that Ghostscript, the GPL PostScript/PDF interpreter,
does not properly handle errors in the gdev_prn_open_printer_seekable()
function, which could result in the execution of arbitrary commands if
malformed document files are processed.

For the stable distribution (bookworm), this problem has been fixed in
version 10.0.0~dfsg-11+deb12u3.

We recommend that you upgrade your ghostscript packages.

For the detailed security status of ghostscript please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/ghostscript

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/