Your message dated Tue, 21 Oct 2014 11:33:49 +0000 with message-id <E1XgXhF-0006dh-6L@franck.debian.org> and subject line Bug#765606: Removed package(s) from unstable has caused the Debian Bug report #754237, regarding kfreebsd-9: SCTP kernel memory disclosures (CVE-2014-3953) to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 754237: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=754237 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: kfreebsd-9: SCTP kernel memory disclosures (CVE-2014-3953)
- From: Steven Chamberlain <steven@pyro.eu.org>
- Date: Tue, 08 Jul 2014 23:48:48 +0100
- Message-id: <20140708224848.93414.92982.reportbug@kfreebsd-amd64.pyro.eu.org>
Package: src:kfreebsd-9 Version: 9.0-10+deb70.7 Severity: grave Tags: security upstream Control: found -1 kfreebsd-9/9.2-2 Hi, FreeBSD-SA-14:17.kmem describes kernel memory disclosures in SCTP control messages: http://security.freebsd.org/advisories/FreeBSD-SA-14:17.kmem.asc > [...] the process may be able to retrieve 2 bytes of kernel memory > for all three control messages, plus 92 bytes for SCTP_SNDRCV and 76 > bytes for SCTP_EXTRCV. If the local process is permitted to receive > SCTP notification, a maximum of 112 bytes of kernel memory may be > returned to userland. I think this affects all our kernels including 8.3 and 9.0 in wheezy. I'm not sure if SCTP must be configured by a superuser first, but for now I'll assume any nonprivileged user might be able to exploit this. -- System Information: Debian Release: 7.1 APT prefers proposed-updates APT policy: (500, 'proposed-updates'), (500, 'stable') Architecture: kfreebsd-amd64 (x86_64) Kernel: kFreeBSD 9.0-2-amd64-xenhvm-ipsec Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash
--- End Message ---
--- Begin Message ---
- To: 531167-done@bugs.debian.org,623217-done@bugs.debian.org,630783-done@bugs.debian.org,651624-done@bugs.debian.org,652448-done@bugs.debian.org,652469-done@bugs.debian.org,658639-done@bugs.debian.org,666729-done@bugs.debian.org,675768-done@bugs.debian.org,677707-done@bugs.debian.org,684072-done@bugs.debian.org,691674-done@bugs.debian.org,691798-done@bugs.debian.org,692080-done@bugs.debian.org,700742-done@bugs.debian.org,702943-done@bugs.debian.org,705126-done@bugs.debian.org,706490-done@bugs.debian.org,708451-done@bugs.debian.org,710959-done@bugs.debian.org,730004-done@bugs.debian.org,731182-done@bugs.debian.org,747983-done@bugs.debian.org,748078-done@bugs.debian.org,750364-done@bugs.debian.org,750493-done@bugs.debian.org,754236-done@bugs.debian.org,754237-done@bugs.debian.org,
- Cc: kfreebsd-9@packages.debian.org, kfreebsd-9@packages.qa.debian.org
- Subject: Bug#765606: Removed package(s) from unstable
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Tue, 21 Oct 2014 11:33:49 +0000
- Message-id: <E1XgXhF-0006dh-6L@franck.debian.org>
Version: 9.2-2+rm Dear submitter, as the package kfreebsd-9 has just been removed from the Debian archive unstable we hereby close the associated bug reports. We are sorry that we couldn't deal with your issue properly. For details on the removal, please see https://bugs.debian.org/765606 The version of this package that was in Debian prior to this removal can still be found using http://snapshot.debian.org/. This message was generated automatically; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmaster@ftp-master.debian.org. Debian distribution maintenance software pp. Scott Kitterman (the ftpmaster behind the curtain)
--- End Message ---