[DLA 3735-1] runc security update
[DSA 5626-1] pdns-recursor security update
[DLA 3734-1] openvswitch security update
[DLA 3735-1] runc security update
-------------------------------------------------------------------------
Debian LTS Advisory DLA-3735-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Daniel Leidert
February 19, 2024 https://wiki.debian.org/LTS
-------------------------------------------------------------------------
Package : runc
Version : 1.0.0~rc6+dfsg1-3+deb10u3
CVE ID : CVE-2021-43784 CVE-2024-21626
Debian Bug :
runc is a command line client for running applications packaged according
to the Open Container Format (OCF) and is a compliant implementation of
the Open Container Project specification.
CVE-2021-43784
A flaw has been detected that may lead to a possible length field
overflow, allowing user-controlled data to be parsed as control
characters.
CVE-2024-21626
A flaw has been detected which allows several container breakouts
due to internally leaked file descriptors. The patch includes fixes
and hardening measurements against these types of issues/attacks.
For Debian 10 buster, these problems have been fixed in version
1.0.0~rc6+dfsg1-3+deb10u3.
We recommend that you upgrade your runc packages.
For the detailed security status of runc please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/runc
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
[DSA 5626-1] pdns-recursor security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5626-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
February 18, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : pdns-recursor
CVE ID : CVE-2023-50387 CVE-2023-50868
It was discovered that malformed DNSSEC records within a DNS zone could
result in denial of service against PDNS Recursor, a resolving
name server.
For the stable distribution (bookworm), these problems have been fixed in
version 4.8.6-1.
We recommend that you upgrade your pdns-recursor packages.
For the detailed security status of pdns-recursor please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/pdns-recursor
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
[DLA 3734-1] openvswitch security update
-------------------------------------------------------------------------
Debian LTS Advisory DLA-3734-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Tobias Frost
February 17, 2024 https://wiki.debian.org/LTS
-------------------------------------------------------------------------
Package : openvswitch
Version : 2.10.7+ds1-0+deb10u5
CVE ID : CVE-2023-5366
Debian Bug :
A flaw was found in Open vSwitch that allows ICMPv6 Neighbor
Advertisement packets between virtual machines to bypass OpenFlow rules.
This issue may allow a local attacker to create specially crafted
packets with a modified or spoofed target IP address field that can
redirect ICMPv6 traffic to arbitrary IP addresses.
For Debian 10 buster, this problem has been fixed in version
2.10.7+ds1-0+deb10u5.
We recommend that you upgrade your openvswitch packages.
For the detailed security status of openvswitch please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openvswitch
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS