FreeBSD devfs Local Security Vulnerability (CVE-2014-3001)
Release date:
Updated on:
Affected Systems:
FreeBSD <10.0 p2
Description:
--------------------------------------------------------------------------------
Bugtraq id: 67158
CVE (CAN) ID: CVE-2014-3001
FreeBSD is a UNIX operating system and an important branch of Unix developed from BSD, javasbsd, and 4.4BSD.
In versions earlier than FreeBSD 10.0 p2, The devfs of the device file system did not load the default rule group at startup, which allows independent context attackers to restrict the process of the device node, attackers can exploit this vulnerability to bypass the target restriction.
A simple tutorial on Rsync synchronization on FreeBSD 8
FreeBSD8.2 system installation Salt
Create FreeBSD system custom installation ISO
FreeBSD builds NAT and configures multiple VLANs on a single Nic
FreeBSD + Windows dual-system installation
<* Source: FreeBSD
Link: ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-13:11.sendfile.asc
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
FreeBSD
-------
FreeBSD has released a Security Bulletin (FreeBSD-SA-13: 11. sendfile. asc) and patches for this:
FreeBSD-SA-13: 11. sendfile. asc: Kernel memory disclosure in sendfile (2)
Link: ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-13:11.sendfile.asc
This article permanently updates the link address: