CVE-2014-8476

NameCVE-2014-8476
DescriptionThe setlogin function in FreeBSD 8.4 through 10.1-RC4 does not initialize the buffer used to store the login name, which allows local users to obtain sensitive information from kernel memory via a call to getlogin, which returns the entire buffer.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-3070-1
NVD severitylow (attack range: local)
Debian Bugs768104, 768106, 768108, 768109

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
kfreebsd-10 (PTS)jessie10.1~svn274115-4fixed
sid, stretch10.3~svn300087-3fixed
kfreebsd-8 (PTS)wheezy8.3-6+deb7u1vulnerable
kfreebsd-9 (PTS)wheezy, wheezy (security)9.0-10+deb70.10fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
kfreebsd-10source(unstable)10.1~svn274115-1low768108
kfreebsd-11unknownexperimental11.0~svn284956-1low768109
kfreebsd-8source(unstable)(unfixed)low768106
kfreebsd-8sourcesqueeze(unfixed)end-of-life
kfreebsd-9source(unstable)(unfixed)low768104
kfreebsd-9sourcewheezy9.0-10+deb70.8lowDSA-3070-1

Notes

[wheezy] - kfreebsd-8 <no-dsa> (kfreebsd-8 only a test kernel, can be fixed in a point release)
[squeeze] - kfreebsd-8 <end-of-life> (Unsupported in squeeze-lts)
http://security.FreeBSD.org/advisories/FreeBSD-SA-14:25.setlogin.asc

Search for package or bug name: Reporting problems