Discover Government News


- -----------------------------------------------------------------------
Debian LTS Advisory DLA-3766-1              debian-lts@lists.debian.org
https://www.debian.org/lts/security/                      Utkarsh Gupta
March 19, 2024                              https://wiki.debian.org/LTS
- -----------------------------------------------------------------------

Package        : zfs-linux
Version        : 0.7.12-2+deb10u3
CVE ID         : CVE-2013-20001 CVE-2023-49298
Debian Bug     : 1059322 1056752

A couple of vulnerabilities were found in zfs-linux.

CVE-2013-20001

    In OpenZFS, when an NFS share is exported to IPv6 addresses via the
    sharenfs feature, there is a silent failure to parse the IPv6
    address data, and access is allowed to everyone. IPv6 restrictions
    from the configuration are not applied.

CVE-2023-49298

    OpenZFS in certain scenarios involving applications that try to rely
    on efficient copying of file data, can replace file contents with
    zero-valued bytes and thus potentially disable security mechanisms.

For Debian 10 buster, these problems have been fixed in version
0.7.12-2+deb10u3.

We recommend that you upgrade your zfs-linux packages.

For the detailed security status of zfs-linux please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/source-package/zfs-linux

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-3766-1: zfs-linux security update

March 18, 2024
A couple of vulnerabilities were found in zfs-linux

Summary

CVE-2013-20001

In OpenZFS, when an NFS share is exported to IPv6 addresses via the
sharenfs feature, there is a silent failure to parse the IPv6
address data, and access is allowed to everyone. IPv6 restrictions
from the configuration are not applied.

CVE-2023-49298

OpenZFS in certain scenarios involving applications that try to rely
on efficient copying of file data, can replace file contents with
zero-valued bytes and thus potentially disable security mechanisms.

For Debian 10 buster, these problems have been fixed in version
0.7.12-2+deb10u3.

We recommend that you upgrade your zfs-linux packages.

For the detailed security status of zfs-linux please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/source-package/zfs-linux

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


Severity
Package : zfs-linux
Version : 0.7.12-2+deb10u3
CVE ID : CVE-2013-20001 CVE-2023-49298
Debian Bug : 1059322 1056752

Related News