Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-8476

Опубликовано: 13 нояб. 2014
Источник: debian

Описание

The setlogin function in FreeBSD 8.4 through 10.1-RC4 does not initialize the buffer used to store the login name, which allows local users to obtain sensitive information from kernel memory via a call to getlogin, which returns the entire buffer.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
kfreebsd-11fixed11.0~svn284956-1experimentalpackage
kfreebsd-10fixed10.1~svn274115-1package
kfreebsd-9removedpackage
kfreebsd-8removedpackage
kfreebsd-8no-dsawheezypackage
kfreebsd-8end-of-lifesqueezepackage

Примечания

  • http://security.FreeBSD.org/advisories/FreeBSD-SA-14:25.setlogin.asc

Связанные уязвимости

ubuntu
около 11 лет назад

The setlogin function in FreeBSD 8.4 through 10.1-RC4 does not initialize the buffer used to store the login name, which allows local users to obtain sensitive information from kernel memory via a call to getlogin, which returns the entire buffer.

nvd
около 11 лет назад

The setlogin function in FreeBSD 8.4 through 10.1-RC4 does not initialize the buffer used to store the login name, which allows local users to obtain sensitive information from kernel memory via a call to getlogin, which returns the entire buffer.

github
больше 3 лет назад

The setlogin function in FreeBSD 8.4 through 10.1-RC4 does not initialize the buffer used to store the login name, which allows local users to obtain sensitive information from kernel memory via a call to getlogin, which returns the entire buffer.