Freebsd

Freebsd

503 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Published 30.01.2025 05:15:10
  • Last modified 07.02.2025 17:15:30

When etcupdate encounters conflicts while merging files, it saves a version containing conflict markers in /var/db/etcupdate/conflicts. This version does not preserve the mode of the input file, and is world-readable. This applies to files that wou...

  • EPSS 0.09%
  • Published 30.01.2025 05:15:10
  • Last modified 07.02.2025 17:15:31

In some cases, the ktrace facility will log the contents of kernel structures to userspace. In one such case, ktrace dumps a variable-sized sockaddr to userspace. There, the full sockaddr is copied, even when it is shorter than the full size. This...

  • EPSS 0.23%
  • Published 30.01.2025 05:15:09
  • Last modified 07.02.2025 17:15:30

On 64-bit systems, the implementation of VOP_VPTOFH() in the cd9660, tarfs and ext2fs filesystems overflows the destination FID buffer by 4 bytes, a stack buffer overflow. A NFS server that exports a cd9660, tarfs, or ext2fs file system can be made ...

  • EPSS 0.04%
  • Published 05.09.2024 05:15:13
  • Last modified 21.11.2024 09:15:25

An insufficient boundary validation in the USB code could lead to an out-of-bounds write on the heap, with data controlled by the caller. A malicious, privileged software running in a guest VM can exploit the vulnerability to achieve code execution ...

  • EPSS 0.16%
  • Published 05.09.2024 05:15:13
  • Last modified 05.09.2024 21:25:09

The ctl_report_supported_opcodes function did not sufficiently validate a field provided by userspace, allowing an arbitrary write to a limited amount of kernel help memory. Malicious software running in a guest VM that exposes virtio_scsi can explo...

  • EPSS 1.2%
  • Published 05.09.2024 05:15:13
  • Last modified 21.11.2024 09:35:00

Concurrent removals of certain anonymous shared memory mappings by using the UMTX_SHM_DESTROY sub-request of UMTX_OP_SHM can lead to decreasing the reference count of the object representing the mapping too many times, causing it to be freed too earl...

  • EPSS 0.16%
  • Published 05.09.2024 05:15:13
  • Last modified 05.09.2024 21:22:04

The ctl_request_sense function could expose up to three bytes of the kernel heap to userspace. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve users...

  • EPSS 1.36%
  • Published 05.09.2024 05:15:13
  • Last modified 06.09.2024 17:35:18

The function ctl_write_buffer incorrectly set a flag which resulted in a kernel Use-After-Free when a command finished processing. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code exec...

  • EPSS 0.07%
  • Published 05.09.2024 05:15:13
  • Last modified 06.09.2024 17:35:20

The ctl_write_buffer and ctl_read_buffer functions allocated memory to be returned to userspace, without initializing it. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on ...

  • EPSS 0.44%
  • Published 05.09.2024 04:15:07
  • Last modified 21.11.2024 09:37:36

A malicious value of size in a structure of packed libnv can cause an integer overflow, leading to the allocation of a smaller buffer than required for the parsed data.