Freebsd

Freebsd

503 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.7%
  • Veröffentlicht 09.08.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:11:25

One of the data structures that holds TCP segments in all versions of FreeBSD prior to 11.2-RELEASE-p1, 11.1-RELEASE-p12, and 10.4-RELEASE-p10 uses an inefficient algorithm to reassemble the data. This causes the CPU time spent on segment processing ...

  • EPSS 2.45%
  • Veröffentlicht 13.07.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 02:56:21

Improper bounds checking of the obuf variable in the link_ntoa() function in linkaddr.c of the BSD libc library may allow an attacker to read or write from memory. The full impact and severity depends on the method of exploit and how the library is u...

  • EPSS 1.33%
  • Veröffentlicht 21.06.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 04:05:51

System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.

Exploit
  • EPSS 2.53%
  • Veröffentlicht 04.06.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:00:29

An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate repl...

  • EPSS 0.06%
  • Veröffentlicht 08.05.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 04:11:25

In FreeBSD before 11.1-STABLE(r332303), 11.1-RELEASE-p10, 10.4-STABLE(r332321), and 10.4-RELEASE-p9, due to insufficient initialization of memory copied to userland in the Linux subsystem and Atheros wireless driver, small amounts of kernel memory ma...

  • EPSS 0.06%
  • Veröffentlicht 08.05.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 04:11:25

In FreeBSD before 11.1-STABLE(r332066) and 11.1-RELEASE-p10, due to insufficient initialization of memory copied to userland in the network subsystem, small amounts of kernel memory may be disclosed to userland processes. Unprivileged authenticated l...

Exploit
  • EPSS 23.21%
  • Veröffentlicht 08.05.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:14:33

A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that ...

  • EPSS 2.21%
  • Veröffentlicht 10.04.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:21:18

In FreeBSD before 11.0-STABLE, 11.0-RELEASE-p10, 10.3-STABLE, and 10.3-RELEASE-p19, ipfilter using "keep state" or "keep frags" options can cause a kernel panic when fed specially crafted packet fragments due to incorrect memory handling.

  • EPSS 1.01%
  • Veröffentlicht 04.04.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:11:25

In FreeBSD before 11.1-STABLE, 11.1-RELEASE-p9, 10.4-STABLE, 10.4-RELEASE-p8 and 10.3-RELEASE-p28, insufficient validation of user-provided font parameters can result in an integer overflow, leading to the use of arbitrary kernel memory as glyph data...

  • EPSS 2.75%
  • Veröffentlicht 04.04.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:11:25

In FreeBSD before 11.1-STABLE, 11.1-RELEASE-p9, 10.4-STABLE, 10.4-RELEASE-p8 and 10.3-RELEASE-p28, the length field of the ipsec option header does not count the size of the option header itself, causing an infinite loop when the length is zero. This...