Package: src:kfreebsd-9 Version: 9.0-10+deb70.2 Severity: grave Tags: security upstream Control: found -1 kfreebsd-9/9.0~svn223109-0.1
http://security.FreeBSD.org/advisories/FreeBSD-SA-13:10.sctp.asc > When initializing the SCTP state cookie being sent in INIT-ACK chunks, > a buffer allocated from the kernel stack is not completely initialized. > Fragments of kernel memory may be included in SCTP packets and > transmitted over the network. For each SCTP session, there are two > separate instances in which a 4-byte fragment may be transmitted. The commit suggests that one of these leaks may be platform specific, depending on padding of struct timeval. But the identification[] member seems to allow for leakage on any platform. kfreebsd-8 and kfreebsd-9 in wheezy will need the patch from r254338 kfreebsd-9 in jessie/sid will need updating to r254355 or later kfreebsd-10 in experimental will need updating to r254338 or later kfreebsd-8 8.1 in oldstable looks to be affected too (likely introduced in r169378 or earlier). The same patch should be suitable. -- System Information: Debian Release: 7.1 APT prefers proposed-updates APT policy: (500, 'proposed-updates'), (500, 'stable') Architecture: kfreebsd-amd64 (x86_64) Kernel: kFreeBSD 9.0-2-amd64-xenhvm Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages kfreebsd-image-9.0-2-amd64-xenhvm depends on: ii devd 9.0-10+deb70.2 ii freebsd-utils 9.0-10+deb70.2 ii kbdcontrol 9.0-10+deb70.2 ii kldutils 9.0-10+deb70.2 kfreebsd-image-9.0-2-amd64-xenhvm recommends no packages. kfreebsd-image-9.0-2-amd64-xenhvm suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org