Freebsd

Freebsd

503 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 17.41%
  • Published 12.08.2024 13:38:44
  • Last modified 21.11.2024 09:51:46

A signal handler in sshd(8) may call a logging function that is not async-signal-safe. The signal handler is invoked when a client does not authenticate within the LoginGraceTime seconds (120 by default). This signal handler executes in the context...

  • EPSS 0.2%
  • Published 12.08.2024 13:38:40
  • Last modified 21.11.2024 09:50:15

When mounting a remote filesystem using NFS, the kernel did not sanitize remotely provided filenames for the path separator character, "/". This allows readdir(3) and related functions to return filesystem entries with names containing additional pa...

  • EPSS 0.17%
  • Published 12.08.2024 13:38:40
  • Last modified 21.11.2024 09:50:15

A logic bug in the code which disables kernel tracing for setuid programs meant that tracing was not disabled when it should have, allowing unprivileged users to trace and inspect the behavior of setuid programs. The bug may be used by an unprivileg...

  • EPSS 0.02%
  • Published 12.08.2024 13:38:39
  • Last modified 26.11.2024 15:15:35

In ICMPv6 Neighbor Discovery (ND), the ID is always 0. When pf is configured to allow ND and block incoming Echo Requests, a crafted Echo Request packet after a Neighbor Solicitation (NS) can trigger an Echo Reply. The packet has to come from the s...

Media report Exploit
  • EPSS 38.58%
  • Published 01.07.2024 13:15:06
  • Last modified 30.09.2025 13:52:23

A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to aut...

Exploit
  • EPSS 6.3%
  • Published 11.04.2024 01:25:15
  • Last modified 17.06.2025 20:54:57

NFS in a BSD derived codebase, as used in OpenBSD through 7.4 and FreeBSD through 14.0-RELEASE, allows remote attackers to execute arbitrary code via a bug that is unrelated to memory corruption.

  • EPSS 0.27%
  • Published 15.02.2024 06:15:45
  • Last modified 04.06.2025 21:59:04

The aio_aqueue function, used by the lio_listio system call, fails to release a reference to a credential in an error case. An attacker may cause the reference count to overflow, leading to a use after free (UAF).

  • EPSS 0.06%
  • Published 15.02.2024 06:15:45
  • Last modified 04.06.2025 22:09:07

A particular case of memory sharing is mishandled in the virtual memory system. This is very similar to SA-21:08.vm, but with a different root cause. An unprivileged local user process can maintain a mapping of a page after it is freed, allowing th...

  • EPSS 0.4%
  • Published 15.02.2024 06:15:45
  • Last modified 04.06.2025 22:09:43

The implementation of lib9p's handling of RWALK messages was missing a bounds check needed when unpacking the message contents. The missing check means that the receipt of a specially crafted message will cause lib9p to overwrite unrelated memory. ...

  • EPSS 3.98%
  • Published 15.02.2024 06:15:45
  • Last modified 04.06.2025 22:15:09

ping reads raw IP packets from the network to process responses in the pr_pack() function. As part of processing a response ping has to reconstruct the IP header, the ICMP header and if present a "quoted packet," which represents the packet that gen...