Freebsd

Freebsd

527 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.67%
  • Veröffentlicht 05.09.2024 05:15:13
  • Zuletzt bearbeitet 04.11.2025 17:16:05

The ctl_request_sense function could expose up to three bytes of the kernel heap to userspace. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve users...

  • EPSS 6.89%
  • Veröffentlicht 05.09.2024 05:15:13
  • Zuletzt bearbeitet 04.11.2025 17:16:14

The function ctl_write_buffer incorrectly set a flag which resulted in a kernel Use-After-Free when a command finished processing. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code exec...

  • EPSS 2.96%
  • Veröffentlicht 05.09.2024 05:15:13
  • Zuletzt bearbeitet 04.11.2025 17:16:16

The ctl_write_buffer and ctl_read_buffer functions allocated memory to be returned to userspace, without initializing it. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on ...

  • EPSS 0.39%
  • Veröffentlicht 05.09.2024 04:15:07
  • Zuletzt bearbeitet 21.11.2024 09:37:36

A malicious value of size in a structure of packed libnv can cause an integer overflow, leading to the allocation of a smaller buffer than required for the parsed data.

  • EPSS 17.41%
  • Veröffentlicht 12.08.2024 13:38:44
  • Zuletzt bearbeitet 21.11.2024 09:51:46

A signal handler in sshd(8) may call a logging function that is not async-signal-safe. The signal handler is invoked when a client does not authenticate within the LoginGraceTime seconds (120 by default). This signal handler executes in the context...

  • EPSS 0.27%
  • Veröffentlicht 12.08.2024 13:38:40
  • Zuletzt bearbeitet 21.11.2024 09:50:15

When mounting a remote filesystem using NFS, the kernel did not sanitize remotely provided filenames for the path separator character, "/". This allows readdir(3) and related functions to return filesystem entries with names containing additional pa...

  • EPSS 0.25%
  • Veröffentlicht 12.08.2024 13:38:40
  • Zuletzt bearbeitet 21.11.2024 09:50:15

A logic bug in the code which disables kernel tracing for setuid programs meant that tracing was not disabled when it should have, allowing unprivileged users to trace and inspect the behavior of setuid programs. The bug may be used by an unprivileg...

  • EPSS 0.03%
  • Veröffentlicht 12.08.2024 13:38:39
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In ICMPv6 Neighbor Discovery (ND), the ID is always 0. When pf is configured to allow ND and block incoming Echo Requests, a crafted Echo Request packet after a Neighbor Solicitation (NS) can trigger an Echo Reply. The packet has to come from the s...

Medienbericht Exploit
  • EPSS 48.42%
  • Veröffentlicht 01.07.2024 13:15:06
  • Zuletzt bearbeitet 12.05.2026 12:17:20

A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to aut...

Exploit
  • EPSS 4.36%
  • Veröffentlicht 11.04.2024 01:25:15
  • Zuletzt bearbeitet 17.06.2025 20:54:57

NFS in a BSD derived codebase, as used in OpenBSD through 7.4 and FreeBSD through 14.0-RELEASE, allows remote attackers to execute arbitrary code via a bug that is unrelated to memory corruption.