Le vendredi 7 novembre 2014, Moritz Muehlenhoff <j...@debian.org> a écrit :

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> - -------------------------------------------------------------------------
> Debian Security Advisory DSA-3070-1                   secur...@debian.org
> <javascript:;>
> http://www.debian.org/security/                        Moritz Muehlenhoff
> November 07, 2014                      http://www.debian.org/security/faq
> - -------------------------------------------------------------------------
>
> Package        : kfreebsd-9


Nous utilisons gnu/Linux sous debian, et pas un Kernel freebsd. Nous ne
sommes pas concernés pas ce CVE.


> CVE ID         : CVE-2014-3711 CVE-2014-3952 CVE-2014-3953 CVE-2014-8476
>
> Several vulnerabilities have been discovered in the FreeBSD kernel that
> may lead to a denial of service or information disclosure.
>
> CVE-2014-3711
>
>     Denial of service through memory leak in sandboxed namei lookups.
>
> CVE-2014-3952
>
>     Kernel memory disclosure in sockbuf control messages.
>
> CVE-2014-3953
>
>     Kernel memory disclosure in SCTP. This update disables SCTP, since the
>     userspace tools shipped in Wheezy didn't support SCTP anyway.
>
> CVE-2014-8476
>
>     Kernel stack disclosure in setlogin() and getlogin().
>
> For the stable distribution (wheezy), these problems have been fixed in
> version 9.0-10+deb70.8.
>
> We recommend that you upgrade your kfreebsd-9 packages.
>
> Further information about Debian Security Advisories, how to apply
> these updates to your system and frequently asked questions can be
> found at: https://www.debian.org/security/
>
> Mailing list: debian-security-annou...@lists.debian.org <javascript:;>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1
>
> iQIcBAEBAgAGBQJUXQcdAAoJEBDCk7bDfE42nr0P/2IAF5Nixr8fo6yxraz35ddG
> CG3b7rnguCi2SBJjGSD2na2VXlNTDMFKjm4NXchLYTJ6qhR8ECWY3+XmcmcwBm/p
> ceHxo4PmmMMednzkj0qtZbmtyMaeA7pWR7EXSkyX89onzb1UuCNGEgkOi89+jjts
> JxaE/MeGvezPm9kikkKUAZ0pyRw0TkwyMGXbNVMgbgq3OAyA0XHwMGhX139779oL
> WiQfMIvxKbBgFxcvEm9BLcc6DZQTj7x2k8f5hTyO89gsnaoTb5jD63owKh//hjLj
> rWhTkurTaJn5gJ2C3UFlN1XgMkRb7H3l1OKqnIOcvi0EG8vPu4HxDtKi/uSqHu+K
> 4UDk/KmC1Llafpk7pVJvh5dqc9XxFAepxiNUFD3mZ34EO9Eecf0Qs4SBRH1SRS+F
> pdtSq6JGhW7aWIHpM/BOjE0CZssRE96wdSqL8AJFvToxtQI+Z14mbUPP4Y33lNlM
> 4PIjKIAT3TGO+jusvH5IDAkBk4M1Ce9u2AeuoIi0R+dD1u7OgiA5wbSfET2QlZk0
> 8Mo2URFl/psaVZ7WRbmIXW5eVDmnqIDoDFKgqM9M/Vx+cU7ViT/ZkGTJY06AU1zp
> HVDfnM9OsUboWcKaphzTARh9PqhREpQAbWCLbp/o0YfLK+e4H6n+UI+OZTtpmWTm
> jfs/VK7bLDzUPCP0/bfe
> =yvgP
> -----END PGP SIGNATURE-----
>
>
> --
> To UNSUBSCRIBE, email to debian-security-announce-requ...@lists.debian.org
> <javascript:;>
> with a subject of "unsubscribe". Trouble? Contact
> listmas...@lists.debian.org <javascript:;>
> Archive:
> https://lists.debian.org/20141107175456.GA24222@pisco.westfalen.local
>
>

-- 
*Benoît CALVEZ*
*Polyconseil* | 26 rue de Berri | 75008 Paris

Reply via email to