CVE-2023-6534
- EPSS 0.26%
- Published 13.12.2023 09:15:34
- Last modified 21.11.2024 08:44:02
In versions of FreeBSD 14.0-RELEASE before 14-RELEASE-p2, FreeBSD 13.2-RELEASE before 13.2-RELEASE-p7 and FreeBSD 12.4-RELEASE before 12.4-RELEASE-p9, the pf(4) packet filter incorrectly validates TCP sequence numbers. This could allow a malicious a...
CVE-2023-6660
- EPSS 0.3%
- Published 13.12.2023 09:15:34
- Last modified 21.11.2024 08:44:18
When a program running on an affected system appends data to a file via an NFS client mount, the bug can cause the NFS client to fail to copy in the data to be written but proceed as though the copy operation had succeeded. This means that the data ...
CVE-2023-5941
- EPSS 0.67%
- Published 08.11.2023 09:15:07
- Last modified 21.11.2024 08:42:49
In versions of FreeBSD 12.4-RELEASE prior to 12.4-RELEASE-p7 and FreeBSD 13.2-RELEASE prior to 13.2-RELEASE-p5 the __sflush() stdio function in libc does not correctly update FILE objects' write space members for write-buffered streams when the write...
CVE-2023-5978
- EPSS 0.16%
- Published 08.11.2023 09:15:07
- Last modified 21.11.2024 08:42:54
In versions of FreeBSD 13-RELEASE before 13-RELEASE-p5, under certain circumstances the cap_net libcasper(3) service incorrectly validates that updated constraints are strictly subsets of the active constraints. When only a list of resolvable domain...
CVE-2023-5370
- EPSS 0.14%
- Published 04.10.2023 04:15:15
- Last modified 21.11.2024 08:41:37
On CPU 0 the check for the SMCCC workaround is called before SMCCC support has been initialized. This resulted in no speculative execution workarounds being installed on CPU 0.
CVE-2023-5368
- EPSS 0.13%
- Published 04.10.2023 04:15:14
- Last modified 21.11.2024 08:41:37
On an msdosfs filesystem, the 'truncate' or 'ftruncate' system calls under certain circumstances populate the additional space in the file with unallocated data from the underlying disk device, rather than zero bytes. This may permit a user with wri...
CVE-2023-5369
- EPSS 0.1%
- Published 04.10.2023 04:15:14
- Last modified 21.11.2024 08:41:37
Before correction, the copy_file_range system call checked only for the CAP_READ and CAP_WRITE capabilities on the input and output file descriptors, respectively. Using an offset is logically equivalent to seeking, and the system call must addition...
CVE-2023-4809
- EPSS 0.48%
- Published 06.09.2023 20:15:08
- Last modified 13.02.2025 18:15:47
In pf packet processing with a 'scrub fragment reassemble' rule, a packet containing multiple IPv6 fragment headers would be reassembled, and then immediately processed. That is, a packet with multiple fragment extension headers would not be recogni...
CVE-2023-3494
- EPSS 0.19%
- Published 01.08.2023 23:15:31
- Last modified 13.02.2025 17:16:57
The fwctl driver implements a state machine which is executed when a bhyve guest accesses certain x86 I/O ports. The interface lets the guest copy a string into a buffer resident in the bhyve process' memory. A bug in the state machine implementati...
CVE-2023-3107
- EPSS 0.21%
- Published 01.08.2023 23:15:30
- Last modified 09.07.2025 14:15:26
A set of carefully crafted ipv6 packets can trigger an integer overflow in the calculation of a fragment reassembled packet's payload length field. This allows an attacker to trigger a kernel panic, resulting in a denial of service.