Le vendredi 7 novembre 2014, Moritz Muehlenhoff <j...@debian.org> a écrit :
> -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > - ------------------------------------------------------------------------- > Debian Security Advisory DSA-3070-1 secur...@debian.org > <javascript:;> > http://www.debian.org/security/ Moritz Muehlenhoff > November 07, 2014 http://www.debian.org/security/faq > - ------------------------------------------------------------------------- > > Package : kfreebsd-9 Nous utilisons gnu/Linux sous debian, et pas un Kernel freebsd. Nous ne sommes pas concernés pas ce CVE. > CVE ID : CVE-2014-3711 CVE-2014-3952 CVE-2014-3953 CVE-2014-8476 > > Several vulnerabilities have been discovered in the FreeBSD kernel that > may lead to a denial of service or information disclosure. > > CVE-2014-3711 > > Denial of service through memory leak in sandboxed namei lookups. > > CVE-2014-3952 > > Kernel memory disclosure in sockbuf control messages. > > CVE-2014-3953 > > Kernel memory disclosure in SCTP. This update disables SCTP, since the > userspace tools shipped in Wheezy didn't support SCTP anyway. > > CVE-2014-8476 > > Kernel stack disclosure in setlogin() and getlogin(). > > For the stable distribution (wheezy), these problems have been fixed in > version 9.0-10+deb70.8. > > We recommend that you upgrade your kfreebsd-9 packages. > > Further information about Debian Security Advisories, how to apply > these updates to your system and frequently asked questions can be > found at: https://www.debian.org/security/ > > Mailing list: debian-security-annou...@lists.debian.org <javascript:;> > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1 > > iQIcBAEBAgAGBQJUXQcdAAoJEBDCk7bDfE42nr0P/2IAF5Nixr8fo6yxraz35ddG > CG3b7rnguCi2SBJjGSD2na2VXlNTDMFKjm4NXchLYTJ6qhR8ECWY3+XmcmcwBm/p > ceHxo4PmmMMednzkj0qtZbmtyMaeA7pWR7EXSkyX89onzb1UuCNGEgkOi89+jjts > JxaE/MeGvezPm9kikkKUAZ0pyRw0TkwyMGXbNVMgbgq3OAyA0XHwMGhX139779oL > WiQfMIvxKbBgFxcvEm9BLcc6DZQTj7x2k8f5hTyO89gsnaoTb5jD63owKh//hjLj > rWhTkurTaJn5gJ2C3UFlN1XgMkRb7H3l1OKqnIOcvi0EG8vPu4HxDtKi/uSqHu+K > 4UDk/KmC1Llafpk7pVJvh5dqc9XxFAepxiNUFD3mZ34EO9Eecf0Qs4SBRH1SRS+F > pdtSq6JGhW7aWIHpM/BOjE0CZssRE96wdSqL8AJFvToxtQI+Z14mbUPP4Y33lNlM > 4PIjKIAT3TGO+jusvH5IDAkBk4M1Ce9u2AeuoIi0R+dD1u7OgiA5wbSfET2QlZk0 > 8Mo2URFl/psaVZ7WRbmIXW5eVDmnqIDoDFKgqM9M/Vx+cU7ViT/ZkGTJY06AU1zp > HVDfnM9OsUboWcKaphzTARh9PqhREpQAbWCLbp/o0YfLK+e4H6n+UI+OZTtpmWTm > jfs/VK7bLDzUPCP0/bfe > =yvgP > -----END PGP SIGNATURE----- > > > -- > To UNSUBSCRIBE, email to debian-security-announce-requ...@lists.debian.org > <javascript:;> > with a subject of "unsubscribe". Trouble? Contact > listmas...@lists.debian.org <javascript:;> > Archive: > https://lists.debian.org/20141107175456.GA24222@pisco.westfalen.local > > -- *Benoît CALVEZ* *Polyconseil* | 26 rue de Berri | 75008 Paris