Debian: DSA-2743-1: kfreebsd-9 security update

    Date26 Aug 2013
    CategoryDebian
    90
    Posted ByLinuxSecurity Advisories
    Several vulnerabilities have been discovered in the FreeBSD kernel that may lead to a privilege escalation or information leak. The Common Vulnerabilities and Exposures project identifies the following problems:
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - ----------------------------------------------------------------------
    Debian Security Advisory DSA-2743-1                This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                         Aurelien Jarno
    August 27, 2013                     http://www.debian.org/security/faq
    - ----------------------------------------------------------------------
    
    Package        : kfreebsd-9
    Vulnerability  : privilege escalation/information leak
    Problem type   : local/remote
    Debian-specific: no
    CVE Id(s)      : CVE-2013-3077 CVE-2013-4851 CVE-2013-5209
    
    Several vulnerabilities have been discovered in the FreeBSD kernel
    that may lead to a privilege escalation or information leak. The
    Common Vulnerabilities and Exposures project identifies the following
    problems:
    
    CVE-2013-3077
        Clement Lecigne from the Google Security Team reported an integer
        overflow in computing the size of a temporary buffer in the IP
        multicast code, which can result in a buffer which is too small
        for the requested operation. An unprivileged process can read or
        write pages of memory which belong to the kernel. These may lead
        to exposure of sensitive information or allow privilege
        escalation.
    
    CVE-2013-4851
        Rick Macklem, Christopher Key and Tim Zingelman reported that the
        FreeBSD kernel incorrectly uses client supplied credentials
        instead of the one configured in exports(5) when filling out the
        anonymous credential for a NFS export, when -network or -host
        restrictions are used at the same time.  The remote client may
        supply privileged credentials (e.g. the root user) when accessing
        a file under the NFS share, which will bypass the normal access
        checks.
    
    CVE-2013-5209
        Julian Seward and Michael Tuexen reported a kernel memory
        disclosure when initializing the SCTP state cookie being sent in
        INIT-ACK chunks, a buffer allocated from the kernel stack is not
        completely initialized.  Fragments of kernel memory may be
        included in SCTP packets and transmitted over the network. For
        each SCTP session, there are two separate instances in which a
        4-byte fragment may be transmitted.
    
        This memory might contain sensitive information, such as portions
        of the file cache or terminal buffers.  This information might be
        directly useful, or it might be leveraged to obtain elevated
        privileges in some way. For example, a terminal buffer might
        include an user-entered password.
    
    For the stable distribution (wheezy), these problems has been fixed in
    version 9.0-10+deb70.3.
    
    We recommend that you upgrade your kfreebsd-9 packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: http://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"40","type":"x","order":"1","pct":48.78,"resources":[]},{"id":"88","title":"Should be more technical","votes":"13","type":"x","order":"2","pct":15.85,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"29","type":"x","order":"3","pct":35.37,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.