Home / mailings [SECURITY] [DSA 3070-1] kfreebsd-9 security update
Posted on 07 November 2014
Debian Security Advisory-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3070-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
November 07, 2014 http://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : kfreebsd-9
CVE ID : CVE-2014-3711 CVE-2014-3952 CVE-2014-3953 CVE-2014-8476
Several vulnerabilities have been discovered in the FreeBSD kernel that
may lead to a denial of service or information disclosure.
CVE-2014-3711
Denial of service through memory leak in sandboxed namei lookups.
CVE-2014-3952
Kernel memory disclosure in sockbuf control messages.
CVE-2014-3953
Kernel memory disclosure in SCTP. This update disables SCTP, since the
userspace tools shipped in Wheezy didn't support SCTP anyway.
CVE-2014-8476
Kernel stack disclosure in setlogin() and getlogin().
For the stable distribution (wheezy), these problems have been fixed in
version 9.0-10+deb70.8.
We recommend that you upgrade your kfreebsd-9 packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org