Debian LTS: DLA-3766-1: zfs-linux security update
Summary
CVE-2013-20001
In OpenZFS, when an NFS share is exported to IPv6 addresses via the
sharenfs feature, there is a silent failure to parse the IPv6
address data, and access is allowed to everyone. IPv6 restrictions
from the configuration are not applied.
CVE-2023-49298
OpenZFS in certain scenarios involving applications that try to rely
on efficient copying of file data, can replace file contents with
zero-valued bytes and thus potentially disable security mechanisms.
For Debian 10 buster, these problems have been fixed in version
0.7.12-2+deb10u3.
We recommend that you upgrade your zfs-linux packages.
For the detailed security status of zfs-linux please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/source-package/zfs-linux
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS