CVE-2025-0374
- EPSS 0.07%
- Veröffentlicht 30.01.2025 05:15:10
- Zuletzt bearbeitet 07.02.2025 17:15:30
When etcupdate encounters conflicts while merging files, it saves a version containing conflict markers in /var/db/etcupdate/conflicts. This version does not preserve the mode of the input file, and is world-readable. This applies to files that wou...
CVE-2025-0662
- EPSS 0.09%
- Veröffentlicht 30.01.2025 05:15:10
- Zuletzt bearbeitet 07.02.2025 17:15:31
In some cases, the ktrace facility will log the contents of kernel structures to userspace. In one such case, ktrace dumps a variable-sized sockaddr to userspace. There, the full sockaddr is copied, even when it is shorter than the full size. This...
- EPSS 0.23%
- Veröffentlicht 30.01.2025 05:15:09
- Zuletzt bearbeitet 07.02.2025 17:15:30
On 64-bit systems, the implementation of VOP_VPTOFH() in the cd9660, tarfs and ext2fs filesystems overflows the destination FID buffer by 4 bytes, a stack buffer overflow. A NFS server that exports a cd9660, tarfs, or ext2fs file system can be made ...
CVE-2024-32668
- EPSS 0.04%
- Veröffentlicht 05.09.2024 05:15:13
- Zuletzt bearbeitet 21.11.2024 09:15:25
An insufficient boundary validation in the USB code could lead to an out-of-bounds write on the heap, with data controlled by the caller. A malicious, privileged software running in a guest VM can exploit the vulnerability to achieve code execution ...
CVE-2024-42416
- EPSS 0.16%
- Veröffentlicht 05.09.2024 05:15:13
- Zuletzt bearbeitet 05.09.2024 21:25:09
The ctl_report_supported_opcodes function did not sufficiently validate a field provided by userspace, allowing an arbitrary write to a limited amount of kernel help memory. Malicious software running in a guest VM that exposes virtio_scsi can explo...
- EPSS 1.2%
- Veröffentlicht 05.09.2024 05:15:13
- Zuletzt bearbeitet 21.11.2024 09:35:00
Concurrent removals of certain anonymous shared memory mappings by using the UMTX_SHM_DESTROY sub-request of UMTX_OP_SHM can lead to decreasing the reference count of the object representing the mapping too many times, causing it to be freed too earl...
CVE-2024-43110
- EPSS 0.16%
- Veröffentlicht 05.09.2024 05:15:13
- Zuletzt bearbeitet 05.09.2024 21:22:04
The ctl_request_sense function could expose up to three bytes of the kernel heap to userspace. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve users...
CVE-2024-45063
- EPSS 1.36%
- Veröffentlicht 05.09.2024 05:15:13
- Zuletzt bearbeitet 06.09.2024 17:35:18
The function ctl_write_buffer incorrectly set a flag which resulted in a kernel Use-After-Free when a command finished processing. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code exec...
CVE-2024-8178
- EPSS 0.07%
- Veröffentlicht 05.09.2024 05:15:13
- Zuletzt bearbeitet 06.09.2024 17:35:20
The ctl_write_buffer and ctl_read_buffer functions allocated memory to be returned to userspace, without initializing it. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on ...
CVE-2024-45287
- EPSS 0.44%
- Veröffentlicht 05.09.2024 04:15:07
- Zuletzt bearbeitet 21.11.2024 09:37:36
A malicious value of size in a structure of packed libnv can cause an integer overflow, leading to the allocation of a smaller buffer than required for the parsed data.