[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

kfreebsd-7/ kfreebsd-6 stable update for CVE-2009-1935 and FreeBSD-SA-09:10.ipv6


the following CVE (Common Vulnerabilities & Exposures) id was
published for kfreebsd-7/kfreebsd-6 some time ago.

| Integer overflow in the pipe_build_write_buffer function
| (sys/kern/sys_pipe.c) in the direct write optimization feature in the
| pipe implementation in FreeBSD 7.1 through 7.2 and 6.3 through 6.4
| allows local users to bypass virtual-to-physical address lookups and
| read sensitive information in memory pages via unspecified vectors.

| Missing permission check on SIOCSIFINFO_IN6 ioctl

Unfortunately the vulnerability described above is not important enough
to get it fixed via regular security update in Debian stable. It does
not warrant a DSA.

However it would be nice if this could get fixed via a regular point update[2].
Please contact the release team for this.

This is an automatically generated mail, in case you are already working on an
upgrade this is of course pointless.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1935
[1] http://security.freebsd.org/advisories/FreeBSD-SA-09:10.ipv6.asc
[2] http://www.debian.org/doc/developers-reference/pkgs.html#upload-stable

Kind regards

Attachment: signature.asc
Description: OpenPGP digital signature

Reply to: