it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Moritz Muehlenhoff <jmm AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 3070-1] kfreebsd-9 security update
- Date: Fri, 7 Nov 2014 18:54:56 +0100
- List-archive: <https://service.piratenpartei.de/pipermail/it-securitynotifies>
- List-id: Sicherheitsankündigungen <it-securitynotifies.lists.piratenpartei.de>
- Old-return-path: <jmm AT inutil.org>
- Priority: urgent
- Resent-date: Fri, 7 Nov 2014 17:55:14 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <oau7MHigqKB.A.hKC.CeQXUB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3070-1 security AT debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
November 07, 2014 http://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : kfreebsd-9
CVE ID : CVE-2014-3711 CVE-2014-3952 CVE-2014-3953 CVE-2014-8476
Several vulnerabilities have been discovered in the FreeBSD kernel that
may lead to a denial of service or information disclosure.
CVE-2014-3711
Denial of service through memory leak in sandboxed namei lookups.
CVE-2014-3952
Kernel memory disclosure in sockbuf control messages.
CVE-2014-3953
Kernel memory disclosure in SCTP. This update disables SCTP, since the
userspace tools shipped in Wheezy didn't support SCTP anyway.
CVE-2014-8476
Kernel stack disclosure in setlogin() and getlogin().
For the stable distribution (wheezy), these problems have been fixed in
version 9.0-10+deb70.8.
We recommend that you upgrade your kfreebsd-9 packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=yvgP
-----END PGP SIGNATURE-----
--
To UNSUBSCRIBE, email to debian-security-announce-REQUEST AT lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster AT lists.debian.org
Archive: https://lists.debian.org/20141107175456.GA24222 AT pisco.westfalen.local
- [IT-SecNots] [SECURITY] [DSA 3070-1] kfreebsd-9 security update, Moritz Muehlenhoff, 07.11.2014
Archiv bereitgestellt durch MHonArc 2.6.19.