Bug#818426: marked as done (kfreebsd-10: CVE-2016-1885: incorrect argument validation in sysarch(2))
Your message dated Sun, 20 Mar 2016 23:25:31 + with message-id and subject line Bug#818426: fixed in kfreebsd-10 10.3~svn296998-1 has caused the Debian Bug report #818426, regarding kfreebsd-10: CVE-2016-1885: incorrect argument validation in sysarch(2) to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 818426: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818426 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: src:kfreebsd-10 Version: 10.1~svn274115-4+kbsd8u2 Severity: grave Tags: upstream patch A local unprivileged user could trigger a kernel panic or DoS attack on kfreebsd-amd64 via sysarch(2) sysctls: https://security.freebsd.org/advisories/FreeBSD-SA-16:15.sysarch.asc This affects kfreebsd-10, and also kfreebsd-9 in wheezy. -- System Information: Debian Release: stretch/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: kfreebsd-amd64 (x86_64) Kernel: kFreeBSD 10.1-0-amd64 Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash --- End Message --- --- Begin Message --- Source: kfreebsd-10 Source-Version: 10.3~svn296998-1 We believe that the bug you reported is fixed in the latest version of kfreebsd-10, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 818...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Steven Chamberlain (supplier of updated kfreebsd-10 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sat, 19 Mar 2016 20:49:47 + Source: kfreebsd-10 Binary: kfreebsd-source-10.3 kfreebsd-headers-10.3-0 kfreebsd-image-10.3-0-amd64 kfreebsd-image-10-amd64 kfreebsd-headers-10.3-0-amd64 kfreebsd-headers-10-amd64 kernel-image-10.3-0-amd64-di nic-modules-10.3-0-amd64-di nic-wireless-modules-10.3-0-amd64-di nic-shared-modules-10.3-0-amd64-di serial-modules-10.3-0-amd64-di usb-serial-modules-10.3-0-amd64-di ppp-modules-10.3-0-amd64-di cdrom-modules-10.3-0-amd64-di scsi-core-modules-10.3-0-amd64-di scsi-modules-10.3-0-amd64-di scsi-extra-modules-10.3-0-amd64-di plip-modules-10.3-0-amd64-di floppy-modules-10.3-0-amd64-di loop-modules-10.3-0-amd64-di ipv6-modules-10.3-0-amd64-di nls-core-modules-10.3-0-amd64-di ext2-modules-10.3-0-amd64-di isofs-modules-10.3-0-amd64-di reiserfs-modules-10.3-0-amd64-di fat-modules-10.3-0-amd64-di zfs-modules-10.3-0-amd64-di nfs-modules-10.3-0-amd64-di nullfs-modules-10.3-0-amd64-di md-modules-10.3-0-amd64-di parport-modules-10.3-0-amd64-di nic-usb-modules-10.3-0-amd64-di sata-modules-10.3-0-amd64-di acpi-modules-10.3-0-amd64-di i2c-modules-10.3-0-amd64-di crypto-modules-10.3-0-amd64-di crypto-dm-modules-10.3-0-amd64-di mmc-core-modules-10.3-0-amd64-di mmc-modules-10.3-0-amd64-di sound-modules-10.3-0-amd64-di zlib-modules-10.3-0-amd64-di kfreebsd-image-10.3-0-486 kfreebsd-image-10-486 kfreebsd-headers-10.3-0-486 kfreebsd-headers-10-486 kfreebsd-image-10.3-0-686 kfreebsd-image-10-686 kfreebsd-headers-10.3-0-686 kfreebsd-headers-10-686 kfreebsd-image-10.3-0-xen kfreebsd-image-10-xen kfreebsd-headers-10.3-0-xen kfreebsd-headers-10-xen kernel-image-10.3-0-486-di nic-modules-10.3-0-486-di nic-wireless-modules-10.3-0-486-di nic-shared-modules-10.3-0-486-di serial-modules-10.3-0-486-di usb-serial-modules-10.3-0-486-di ppp-modules-10.3-0-486-di cdrom-modules-10.3-0-486-di scsi-core-modules-10.3-0-486-di scsi-modules-10.3-0-486-di scsi-extra-modules-10.3-0-486-di plip-modules-10.3-0-486-di floppy-modules-10.3-0-486-di loop-modules-10.3-0-486-di ipv6-modules-10.3-0-486-di nls-core-modules-10.3-0-486-di ext2-modules-10.3-0-486-di isofs-modules-10.3-0-486-di reiserfs-modules-10.3-0-486-di fat-modules-10.3-0-486-di zfs-modules-10.3-0-486-di nfs-modules-10.3-0-486-di nullfs-modules-10.3-0-486-di md-modules-10.3-0-486-di parport-modules-10.3-0-486-di nic-usb-modules-10.3-0-486-di sata-modules-10.3-0-486-di acpi-modules-10.3-0-486-di i2c-modules-10.3-0-486-di crypto-modules-10.3-0-486-di crypto-dm-modules-10.3-0-486-di mmc-core-modules-10.3-0-486-di mmc-modules-10.3-0-486-di sound-modules-10.3-0-486-di zlib-modules-10.3-0-486-di Archi
Bug#818426: marked as done (kfreebsd-10: CVE-2016-1885: incorrect argument validation in sysarch(2))
Your message dated Thu, 17 Mar 2016 03:59:34 + with message-id and subject line Bug#818426: fixed in kfreebsd-10 10.1~svn274115-4+kbsd8u3 has caused the Debian Bug report #818426, regarding kfreebsd-10: CVE-2016-1885: incorrect argument validation in sysarch(2) to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 818426: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818426 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: src:kfreebsd-10 Version: 10.1~svn274115-4+kbsd8u2 Severity: grave Tags: upstream patch A local unprivileged user could trigger a kernel panic or DoS attack on kfreebsd-amd64 via sysarch(2) sysctls: https://security.freebsd.org/advisories/FreeBSD-SA-16:15.sysarch.asc This affects kfreebsd-10, and also kfreebsd-9 in wheezy. -- System Information: Debian Release: stretch/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: kfreebsd-amd64 (x86_64) Kernel: kFreeBSD 10.1-0-amd64 Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash --- End Message --- --- Begin Message --- Source: kfreebsd-10 Source-Version: 10.1~svn274115-4+kbsd8u3 We believe that the bug you reported is fixed in the latest version of kfreebsd-10, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 818...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Steven Chamberlain (supplier of updated kfreebsd-10 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 16 Mar 2016 23:16:33 + Source: kfreebsd-10 Binary: kfreebsd-source-10.1 kfreebsd-headers-10.1-0 kfreebsd-image-10.1-0-amd64 kfreebsd-image-10-amd64 kfreebsd-headers-10.1-0-amd64 kfreebsd-headers-10-amd64 kernel-image-10.1-0-amd64-di nic-modules-10.1-0-amd64-di nic-wireless-modules-10.1-0-amd64-di nic-shared-modules-10.1-0-amd64-di serial-modules-10.1-0-amd64-di usb-serial-modules-10.1-0-amd64-di ppp-modules-10.1-0-amd64-di cdrom-modules-10.1-0-amd64-di scsi-core-modules-10.1-0-amd64-di scsi-modules-10.1-0-amd64-di scsi-extra-modules-10.1-0-amd64-di plip-modules-10.1-0-amd64-di floppy-modules-10.1-0-amd64-di loop-modules-10.1-0-amd64-di ipv6-modules-10.1-0-amd64-di nls-core-modules-10.1-0-amd64-di ext2-modules-10.1-0-amd64-di isofs-modules-10.1-0-amd64-di reiserfs-modules-10.1-0-amd64-di fat-modules-10.1-0-amd64-di zfs-modules-10.1-0-amd64-di nfs-modules-10.1-0-amd64-di nullfs-modules-10.1-0-amd64-di md-modules-10.1-0-amd64-di parport-modules-10.1-0-amd64-di nic-usb-modules-10.1-0-amd64-di sata-modules-10.1-0-amd64-di acpi-modules-10.1-0-amd64-di i2c-modules-10.1-0-amd64-di crypto-modules-10.1-0-amd64-di crypto-dm-modules-10.1-0-amd64-di mmc-core-modules-10.1-0-amd64-di mmc-modules-10.1-0-amd64-di sound-modules-10.1-0-amd64-di zlib-modules-10.1-0-amd64-di kfreebsd-image-10.1-0-486 kfreebsd-image-10-486 kfreebsd-headers-10.1-0-486 kfreebsd-headers-10-486 kfreebsd-image-10.1-0-686 kfreebsd-image-10-686 kfreebsd-headers-10.1-0-686 kfreebsd-headers-10-686 kfreebsd-image-10.1-0-xen kfreebsd-image-10-xen kfreebsd-headers-10.1-0-xen kfreebsd-headers-10-xen kernel-image-10.1-0-486-di nic-modules-10.1-0-486-di nic-wireless-modules-10.1-0-486-di nic-shared-modules-10.1-0-486-di serial-modules-10.1-0-486-di usb-serial-modules-10.1-0-486-di ppp-modules-10.1-0-486-di cdrom-modules-10.1-0-486-di scsi-core-modules-10.1-0-486-di scsi-modules-10.1-0-486-di scsi-extra-modules-10.1-0-486-di plip-modules-10.1-0-486-di floppy-modules-10.1-0-486-di loop-modules-10.1-0-486-di ipv6-modules-10.1-0-486-di nls-core-modules-10.1-0-486-di ext2-modules-10.1-0-486-di isofs-modules-10.1-0-486-di reiserfs-modules-10.1-0-486-di fat-modules-10.1-0-486-di zfs-modules-10.1-0-486-di nfs-modules-10.1-0-486-di nullfs-modules-10.1-0-486-di md-modules-10.1-0-486-di parport-modules-10.1-0-486-di nic-usb-modules-10.1-0-486-di sata-modules-10.1-0-486-di acpi-modules-10.1-0-486-di i2c-modules-10.1-0-486-di crypto-modules-10.1-0-486-di crypto-dm-modules-10.1-0-486-di mmc-core-modules-10.1-0-486-di mmc-modules-10.1-0-486-di sound-modules-10.1-0-486-di zlib-modules-10.1-