CVE-2014-8476

NameCVE-2014-8476
DescriptionThe setlogin function in FreeBSD 8.4 through 10.1-RC4 does not initialize the buffer used to store the login name, which allows local users to obtain sensitive information from kernel memory via a call to getlogin, which returns the entire buffer.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-3070-1
Debian Bugs768104, 768106, 768108, 768109

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
kfreebsd-10source(unstable)10.1~svn274115-1768108
kfreebsd-11unknownexperimental11.0~svn284956-1768109
kfreebsd-8sourcesqueeze(unfixed)end-of-life
kfreebsd-8source(unstable)(unfixed)768106
kfreebsd-9sourcewheezy9.0-10+deb70.8DSA-3070-1
kfreebsd-9source(unstable)(unfixed)768104

Notes

[wheezy] - kfreebsd-8 <no-dsa> (kfreebsd-8 only a test kernel, can be fixed in a point release)
[squeeze] - kfreebsd-8 <end-of-life> (Unsupported in squeeze-lts)
http://security.FreeBSD.org/advisories/FreeBSD-SA-14:25.setlogin.asc

Search for package or bug name: Reporting problems