Debian 9988 Published by

The following security updates are available for Debian GNU/Linux:

[DLA 3735-1] runc security update
[DSA 5626-1] pdns-recursor security update
[DLA 3734-1] openvswitch security update



[DLA 3735-1] runc security update


-------------------------------------------------------------------------
Debian LTS Advisory DLA-3735-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Daniel Leidert
February 19, 2024 https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package : runc
Version : 1.0.0~rc6+dfsg1-3+deb10u3
CVE ID : CVE-2021-43784 CVE-2024-21626
Debian Bug :

runc is a command line client for running applications packaged according
to the Open Container Format (OCF) and is a compliant implementation of
the Open Container Project specification.

CVE-2021-43784

A flaw has been detected that may lead to a possible length field
overflow, allowing user-controlled data to be parsed as control
characters.

CVE-2024-21626

A flaw has been detected which allows several container breakouts
due to internally leaked file descriptors. The patch includes fixes
and hardening measurements against these types of issues/attacks.

For Debian 10 buster, these problems have been fixed in version
1.0.0~rc6+dfsg1-3+deb10u3.

We recommend that you upgrade your runc packages.

For the detailed security status of runc please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/runc

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



[DSA 5626-1] pdns-recursor security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-5626-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
February 18, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : pdns-recursor
CVE ID : CVE-2023-50387 CVE-2023-50868

It was discovered that malformed DNSSEC records within a DNS zone could
result in denial of service against PDNS Recursor, a resolving
name server.

For the stable distribution (bookworm), these problems have been fixed in
version 4.8.6-1.

We recommend that you upgrade your pdns-recursor packages.

For the detailed security status of pdns-recursor please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/pdns-recursor

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/


[DLA 3734-1] openvswitch security update


-------------------------------------------------------------------------
Debian LTS Advisory DLA-3734-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Tobias Frost
February 17, 2024 https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package : openvswitch
Version : 2.10.7+ds1-0+deb10u5
CVE ID : CVE-2023-5366
Debian Bug :

A flaw was found in Open vSwitch that allows ICMPv6 Neighbor
Advertisement packets between virtual machines to bypass OpenFlow rules.
This issue may allow a local attacker to create specially crafted
packets with a modified or spoofed target IP address field that can
redirect ICMPv6 traffic to arbitrary IP addresses.

For Debian 10 buster, this problem has been fixed in version
2.10.7+ds1-0+deb10u5.

We recommend that you upgrade your openvswitch packages.

For the detailed security status of openvswitch please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openvswitch

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS