kfreebsd-9: sockbuf CMSG kernel memory disclosure (CVE-2014-3952)

Related Vulnerabilities: CVE-2014-3952  

Debian Bug report logs - #754236
kfreebsd-9: sockbuf CMSG kernel memory disclosure (CVE-2014-3952)

version graph

Package: src:kfreebsd-9; Maintainer for src:kfreebsd-9 is (unknown);

Reported by: Steven Chamberlain <steven@pyro.eu.org>

Date: Tue, 8 Jul 2014 22:45:01 UTC

Severity: important

Tags: security, upstream

Found in versions kfreebsd-9/9.2-2, kfreebsd-9/9.0-10+deb70.7

Fixed in version 9.2-2+rm

Done: Debian FTP Masters <ftpmaster@ftp-master.debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, steven@pyro.eu.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, GNU/kFreeBSD Maintainers <debian-bsd@lists.debian.org>:
Bug#754236; Package src:kfreebsd-9. (Tue, 08 Jul 2014 22:45:06 GMT) (full text, mbox, link).


Acknowledgement sent to Steven Chamberlain <steven@pyro.eu.org>:
New Bug report received and forwarded. Copy sent to steven@pyro.eu.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, GNU/kFreeBSD Maintainers <debian-bsd@lists.debian.org>. (Tue, 08 Jul 2014 22:45:06 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Steven Chamberlain <steven@pyro.eu.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: kfreebsd-9: sockbuf CMSG kernel memory disclosure (CVE-2014-3952)
Date: Tue, 08 Jul 2014 23:42:10 +0100
Package: src:kfreebsd-9
Version: 9.0-10+deb70.7
Severity: important
Tags: security upstream
Control: found -1 kfreebsd-9/9.2-2

Hi,

FreeBSD-SA-14:17.kmem describes a kernel memory disclosure
(of up to 4 bytes) by control messages in kern/uipc_sockbuf.c

http://security.freebsd.org/advisories/FreeBSD-SA-14:17.kmem.asc
> Buffer between control message header and data may not be completely
> initialized before being copied to userland. [CVE-2014-3952]

I think this affects all our kernels including 8.3 and 9.0 in wheezy.

-- System Information:
Debian Release: 7.1
  APT prefers proposed-updates
  APT policy: (500, 'proposed-updates'), (500, 'stable')
Architecture: kfreebsd-amd64 (x86_64)

Kernel: kFreeBSD 9.0-2-amd64-xenhvm-ipsec
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash



Marked as found in versions kfreebsd-9/9.2-2. Request was from Steven Chamberlain <steven@pyro.eu.org> to submit@bugs.debian.org. (Tue, 08 Jul 2014 22:45:06 GMT) (full text, mbox, link).


Added tag(s) pending. Request was from Steven Chamberlain <steven@pyro.eu.org> to control@bugs.debian.org. (Wed, 15 Oct 2014 13:48:22 GMT) (full text, mbox, link).


Reply sent to Debian FTP Masters <ftpmaster@ftp-master.debian.org>:
You have taken responsibility. (Tue, 21 Oct 2014 11:37:53 GMT) (full text, mbox, link).


Notification sent to Steven Chamberlain <steven@pyro.eu.org>:
Bug acknowledged by developer. (Tue, 21 Oct 2014 11:37:53 GMT) (full text, mbox, link).


Message #14 received at 754236-done@bugs.debian.org (full text, mbox, reply):

From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
To: 531167-done@bugs.debian.org,623217-done@bugs.debian.org,630783-done@bugs.debian.org,651624-done@bugs.debian.org,652448-done@bugs.debian.org,652469-done@bugs.debian.org,658639-done@bugs.debian.org,666729-done@bugs.debian.org,675768-done@bugs.debian.org,677707-done@bugs.debian.org,684072-done@bugs.debian.org,691674-done@bugs.debian.org,691798-done@bugs.debian.org,692080-done@bugs.debian.org,700742-done@bugs.debian.org,702943-done@bugs.debian.org,705126-done@bugs.debian.org,706490-done@bugs.debian.org,708451-done@bugs.debian.org,710959-done@bugs.debian.org,730004-done@bugs.debian.org,731182-done@bugs.debian.org,747983-done@bugs.debian.org,748078-done@bugs.debian.org,750364-done@bugs.debian.org,750493-done@bugs.debian.org,754236-done@bugs.debian.org,754237-done@bugs.debian.org,
Cc: kfreebsd-9@packages.debian.org, kfreebsd-9@packages.qa.debian.org
Subject: Bug#765606: Removed package(s) from unstable
Date: Tue, 21 Oct 2014 11:33:49 +0000
Version: 9.2-2+rm

Dear submitter,

as the package kfreebsd-9 has just been removed from the Debian archive
unstable we hereby close the associated bug reports.  We are sorry
that we couldn't deal with your issue properly.

For details on the removal, please see https://bugs.debian.org/765606

The version of this package that was in Debian prior to this removal
can still be found using http://snapshot.debian.org/.

This message was generated automatically; if you believe that there is
a problem with it please contact the archive administrators by mailing
ftpmaster@ftp-master.debian.org.

Debian distribution maintenance software
pp.
Scott Kitterman (the ftpmaster behind the curtain)



Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Mon, 09 Mar 2015 07:27:53 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 18:51:36 2019; Machine Name: beach

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.