[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#720476: marked as done (kfreebsd-8: CVE-2013-5209: sctp kernel memory disclosure)



Your message dated Mon, 02 Sep 2013 21:16:43 +0000
with message-id <E1VGbUJ-00033e-A2@franck.debian.org>
and subject line Bug#721540: Removed package(s) from unstable
has caused the Debian Bug report #720476,
regarding kfreebsd-8: CVE-2013-5209: sctp kernel memory disclosure
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
720476: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=720476
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: src:kfreebsd-8
Version: 8.3-7
Severity: grave
Tags: security upstream
Control: found -1 kfreebsd-8/8.0-1

http://security.FreeBSD.org/advisories/FreeBSD-SA-13:10.sctp.asc

> When initializing the SCTP state cookie being sent in INIT-ACK chunks,
> a buffer allocated from the kernel stack is not completely initialized.

> Fragments of kernel memory may be included in SCTP packets and
> transmitted over the network.  For each SCTP session, there are two
> separate instances in which a 4-byte fragment may be transmitted.

The commit suggests that one of these leaks may be platform specific,
depending on padding of struct timeval.  But the identification[] member
seems to allow for leakage on any platform.

kfreebsd-8 and kfreebsd-9 in wheezy will need the patch from r254338

kfreebsd-9 in jessie/sid will need updating to r254355 or later

kfreebsd-10 in experimental will need updating to r254338 or later

kfreebsd-8 8.1 in oldstable looks to be affected too (likely introduced
in r169378 or earlier).  The same patch should be suitable.

-- System Information:
Debian Release: 7.1
  APT prefers proposed-updates
  APT policy: (500, 'proposed-updates'), (500, 'stable')
Architecture: kfreebsd-amd64 (x86_64)

Kernel: kFreeBSD 9.0-2-amd64-xenhvm
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages kfreebsd-image-9.0-2-amd64-xenhvm depends on:
ii  devd           9.0-10+deb70.2
ii  freebsd-utils  9.0-10+deb70.2
ii  kbdcontrol     9.0-10+deb70.2
ii  kldutils       9.0-10+deb70.2

kfreebsd-image-9.0-2-amd64-xenhvm recommends no packages.

kfreebsd-image-9.0-2-amd64-xenhvm suggests no packages.

-- no debconf information

--- End Message ---
--- Begin Message ---
Version: 8.3-7+rm

Dear submitter,

as the package kfreebsd-8 has just been removed from the Debian archive
unstable we hereby close the associated bug reports.  We are sorry
that we couldn't deal with your issue properly.

For details on the removal, please see http://bugs.debian.org/721540

The version of this package that was in Debian prior to this removal
can still be found using http://snapshot.debian.org/.

This message was generated automatically; if you believe that there is
a problem with it please contact the archive administrators by mailing
ftpmaster@ftp-master.debian.org.

Debian distribution maintenance software
pp.
Luca Falavigna (the ftpmaster behind the curtain)

--- End Message ---

Reply to: