Debian: DSA-3070-1: kfreebsd-9 security update

    Date07 Nov 2014
    CategoryDebian
    27
    Posted ByLinuxSecurity Advisories
    Several vulnerabilities have been discovered in the FreeBSD kernel that may lead to a denial of service or information disclosure. CVE-2014-3711
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-3070-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                        Moritz Muehlenhoff
    November 07, 2014                      http://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : kfreebsd-9
    CVE ID         : CVE-2014-3711 CVE-2014-3952 CVE-2014-3953 CVE-2014-8476
    
    Several vulnerabilities have been discovered in the FreeBSD kernel that 
    may lead to a denial of service or information disclosure.
    
    CVE-2014-3711
    
        Denial of service through memory leak in sandboxed namei lookups.
    
    CVE-2014-3952
    
        Kernel memory disclosure in sockbuf control messages.
    
    CVE-2014-3953
    
        Kernel memory disclosure in SCTP. This update disables SCTP, since the
        userspace tools shipped in Wheezy didn't support SCTP anyway.
    
    CVE-2014-8476
    
        Kernel stack disclosure in setlogin() and getlogin().
    
    For the stable distribution (wheezy), these problems have been fixed in
    version 9.0-10+deb70.8.
    
    We recommend that you upgrade your kfreebsd-9 packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    Do you read our distribution advisories on a regular basis?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /component/communitypolls/?task=poll.vote&format=json
    23
    radio
    [{"id":"84","title":"Yes, for a single distribution","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"85","title":"Yes, for multiple distributions","votes":"6","type":"x","order":"2","pct":60,"resources":[]},{"id":"86","title":"No","votes":"4","type":"x","order":"3","pct":40,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.