Hi Robert,

On 23/08/13 14:26, Aurelien Jarno via RT wrote:
> The debdiff looks fine to me. Could you please upload the resulting
> package for either ki or ka to security-master? I'll handle the
> remaining part of the DSA when possible.

Would you be able to upload to security-master with the attached debdiff
please?  (Aurélien approved this on behalf of the security team).

This is also staged in SVN branches/wheezy/kfreebsd-9/ @r4901.

The other, unimportant issues can wait until the next s-p-u probably.

Thanks,
Regards,
-- 
Steven Chamberlain
ste...@pyro.eu.org
diff -Nru kfreebsd-9-9.0/debian/changelog kfreebsd-9-9.0/debian/changelog
--- kfreebsd-9-9.0/debian/changelog     2013-06-23 14:47:37.000000000 +0100
+++ kfreebsd-9-9.0/debian/changelog     2013-08-22 14:18:36.000000000 +0100
@@ -1,3 +1,15 @@
+kfreebsd-9 (9.0-10+deb70.3) wheezy-security; urgency=high
+
+  * Team upload.
+  * Pick SVN 253693 from FreeBSD 9-STABLE to fix SA-13:08 / CVE-2013-4851:
+    Incorrect privilege validation in the NFS server (Closes: #717958)
+  * Pick SVN 254629 from FreeBSD 9-STABLE to fix SA-13:09 / CVE-2013-3077:
+    integer overflow in IP_MSFILTER (Closes: #720468)
+  * Pick SVN 254352 from FreeBSD 9-STABLE to fix SA-13:10 / CVE-2013-5209:
+    Kernel memory disclosure in sctp(4) (Closes: #720475)
+
+ -- Steven Chamberlain <ste...@pyro.eu.org>  Thu, 22 Aug 2013 14:13:16 +0100
+
 kfreebsd-9 (9.0-10+deb70.2) wheezy-security; urgency=high
 
   * Team upload.
diff -Nru kfreebsd-9-9.0/debian/patches/SA-13_08.nfsserver.patch 
kfreebsd-9-9.0/debian/patches/SA-13_08.nfsserver.patch
--- kfreebsd-9-9.0/debian/patches/SA-13_08.nfsserver.patch      1970-01-01 
01:00:00.000000000 +0100
+++ kfreebsd-9-9.0/debian/patches/SA-13_08.nfsserver.patch      2013-08-22 
13:30:04.000000000 +0100
@@ -0,0 +1,23 @@
+Description:
+ Fix a bug that allows remote client bypass the normal
+ access checks when when -network or -host restrictions
+ are used at the same time with -mapall. [13:08]
+ (CVE-2013-4851)
+Origin: vendor, http://security.FreeBSD.org/patches/SA-13:08/nfsserver.patch
+Bug: http://www.freebsd.org/security/advisories/FreeBSD-SA-13:08.nfsserver.asc
+Bug-Debian: http://bugs.debian.org/717958
+Applied-Upstream: http://svnweb.freebsd.org/base?view=revision&revision=253693
+
+Index: kfreebsd-9-9.0/sys/kern/vfs_export.c
+===================================================================
+--- kfreebsd-9-9.0.orig/sys/kern/vfs_export.c  2009-09-28 19:07:16.000000000 
+0100
++++ kfreebsd-9-9.0/sys/kern/vfs_export.c       2013-07-28 18:13:25.223547283 
+0100
+@@ -208,7 +208,7 @@
+       np->netc_anon = crget();
+       np->netc_anon->cr_uid = argp->ex_anon.cr_uid;
+       crsetgroups(np->netc_anon, argp->ex_anon.cr_ngroups,
+-          np->netc_anon->cr_groups);
++          argp->ex_anon.cr_groups);
+       np->netc_anon->cr_prison = &prison0;
+       prison_hold(np->netc_anon->cr_prison);
+       np->netc_numsecflavors = argp->ex_numsecflavors;
diff -Nru kfreebsd-9-9.0/debian/patches/SA-13_09.ip_multicast.patch 
kfreebsd-9-9.0/debian/patches/SA-13_09.ip_multicast.patch
--- kfreebsd-9-9.0/debian/patches/SA-13_09.ip_multicast.patch   1970-01-01 
01:00:00.000000000 +0100
+++ kfreebsd-9-9.0/debian/patches/SA-13_09.ip_multicast.patch   2013-08-22 
13:31:10.000000000 +0100
@@ -0,0 +1,35 @@
+Description:
+ Fix an integer overflow in computing the size of a temporary buffer
+ can result in a buffer which is too small for the requested
+ operation. [13:09] (CVE-2013-3077)
+Origin: vendor, http://security.FreeBSD.org/patches/SA-13:09/ip_multicast.patch
+Bug: http://security.FreeBSD.org/advisories/FreeBSD-SA-13:09.ip_multicast.asc
+Bug-Debian: http://bugs.debian.org/720468
+Applied-Upstream: http://svnweb.freebsd.org/base?view=revision&revision=254629
+
+Index: kfreebsd-9-9.0/sys/netinet/in_mcast.c
+===================================================================
+--- kfreebsd-9-9.0.orig/sys/netinet/in_mcast.c 2010-04-10 13:05:31.000000000 
+0100
++++ kfreebsd-9-9.0/sys/netinet/in_mcast.c      2013-08-22 13:31:07.139830942 
+0100
+@@ -1613,6 +1613,8 @@
+        * has asked for, but we always tell userland how big the
+        * buffer really needs to be.
+        */
++      if (msfr.msfr_nsrcs > in_mcast_maxsocksrc)
++              msfr.msfr_nsrcs = in_mcast_maxsocksrc;
+       tss = NULL;
+       if (msfr.msfr_srcs != NULL && msfr.msfr_nsrcs > 0) {
+               tss = malloc(sizeof(struct sockaddr_storage) * msfr.msfr_nsrcs,
+Index: kfreebsd-9-9.0/sys/netinet6/in6_mcast.c
+===================================================================
+--- kfreebsd-9-9.0.orig/sys/netinet6/in6_mcast.c       2011-11-23 
15:18:16.000000000 +0000
++++ kfreebsd-9-9.0/sys/netinet6/in6_mcast.c    2013-08-22 13:31:07.141767292 
+0100
+@@ -1624,6 +1624,8 @@
+        * has asked for, but we always tell userland how big the
+        * buffer really needs to be.
+        */
++      if (msfr.msfr_nsrcs > in6_mcast_maxsocksrc)
++              msfr.msfr_nsrcs = in6_mcast_maxsocksrc;
+       tss = NULL;
+       if (msfr.msfr_srcs != NULL && msfr.msfr_nsrcs > 0) {
+               tss = malloc(sizeof(struct sockaddr_storage) * msfr.msfr_nsrcs,
diff -Nru kfreebsd-9-9.0/debian/patches/SA-13_10.sctp.patch 
kfreebsd-9-9.0/debian/patches/SA-13_10.sctp.patch
--- kfreebsd-9-9.0/debian/patches/SA-13_10.sctp.patch   1970-01-01 
01:00:00.000000000 +0100
+++ kfreebsd-9-9.0/debian/patches/SA-13_10.sctp.patch   2013-08-22 
14:11:33.000000000 +0100
@@ -0,0 +1,27 @@
+Description:
+ Fix a bug that could lead to kernel memory disclosure with
+ SCTP state cookie. [13:10] (CVE-2013-5209)
+Origin: vendor, http://security.FreeBSD.org/patches/SA-13:10/sctp.patch
+Bug: http://security.FreeBSD.org/advisories/FreeBSD-SA-13:10.sctp.asc
+Bug-Debian: http://bugs.debian.org/720475
+Applied-Upstream: http://svnweb.freebsd.org/base?view=revision&revision=254352
+
+Index: kfreebsd-9-9.0/sys/netinet/sctp_output.c
+===================================================================
+--- kfreebsd-9-9.0.orig/sys/netinet/sctp_output.c      2011-11-27 
19:13:45.000000000 +0000
++++ kfreebsd-9-9.0/sys/netinet/sctp_output.c   2013-08-22 13:56:33.325837810 
+0100
+@@ -5451,6 +5451,14 @@
+       }
+       SCTP_BUF_LEN(m) = sizeof(struct sctp_init_chunk);
+ 
++      /*
++       * We might not overwrite the identification[] completely and on
++       * some platforms time_entered will contain some padding. Therefore
++       * zero out the cookie to avoid putting uninitialized memory on the
++       * wire.
++       */
++      memset(&stc, 0, sizeof(struct sctp_state_cookie));
++
+       /* the time I built cookie */
+       (void)SCTP_GETTIME_TIMEVAL(&stc.time_entered);
+ 
diff -Nru kfreebsd-9-9.0/debian/patches/series 
kfreebsd-9-9.0/debian/patches/series
--- kfreebsd-9-9.0/debian/patches/series        2013-06-23 14:47:37.000000000 
+0100
+++ kfreebsd-9-9.0/debian/patches/series        2013-08-22 13:51:14.000000000 
+0100
@@ -10,6 +10,9 @@
 SA-12_08.linux.patch
 SA-13_05.nfsserver.patch
 SA-13_06.mmap.patch
+SA-13_08.nfsserver.patch
+SA-13_09.ip_multicast.patch
+SA-13_10.sctp.patch
 
 # Other patches that might or might not be mergeable
 001_misc.diff

Reply via email to