Freebsd

Freebsd

515 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.4%
  • Veröffentlicht 15.02.2024 06:15:45
  • Zuletzt bearbeitet 04.06.2025 22:09:43

The implementation of lib9p's handling of RWALK messages was missing a bounds check needed when unpacking the message contents. The missing check means that the receipt of a specially crafted message will cause lib9p to overwrite unrelated memory. ...

  • EPSS 4.26%
  • Veröffentlicht 15.02.2024 06:15:45
  • Zuletzt bearbeitet 04.06.2025 22:15:09

ping reads raw IP packets from the network to process responses in the pr_pack() function. As part of processing a response ping has to reconstruct the IP header, the ICMP header and if present a "quoted packet," which represents the packet that gen...

  • EPSS 0.23%
  • Veröffentlicht 15.02.2024 05:15:11
  • Zuletzt bearbeitet 04.06.2025 21:24:01

`bhyveload -h <host-path>` may be used to grant loader access to the <host-path> directory tree on the host. Affected versions of bhyveload(8) do not make any attempt to restrict loader's access to <host-path>, allowing the loader to read any file t...

  • EPSS 0.09%
  • Veröffentlicht 15.02.2024 05:15:11
  • Zuletzt bearbeitet 04.06.2025 21:55:22

The jail(2) system call has not limited a visiblity of allocated TTYs (the kern.ttys sysctl). This gives rise to an information leak about processes outside the current jail. Attacker can get information about TTYs allocated on the host or in other...

  • EPSS 0.19%
  • Veröffentlicht 15.02.2024 05:15:09
  • Zuletzt bearbeitet 09.12.2024 17:27:22

A user-provided integer option was passed to nmreq_copyin() without checking if it would overflow. This insufficient bounds checking could lead to kernel memory corruption. On systems configured to include netmap in their devfs_ruleset, a privilege...

  • EPSS 0.25%
  • Veröffentlicht 15.02.2024 05:15:09
  • Zuletzt bearbeitet 09.12.2024 23:24:03

Handlers for *_CFG_PAGE read / write ioctls in the mpr, mps, and mpt drivers allocated a buffer of a caller-specified size, but copied to it a fixed size header. Other heap content would be overwritten if the specified size was too small. Users wit...

  • EPSS 0.11%
  • Veröffentlicht 15.02.2024 05:15:09
  • Zuletzt bearbeitet 27.03.2025 20:15:16

The e1000 network adapters permit a variety of modifications to an Ethernet packet when it is being transmitted. These include the insertion of IP and TCP checksums, insertion of an Ethernet VLAN header, and TCP segmentation offload ("TSO"). The e1...

  • EPSS 5.94%
  • Veröffentlicht 15.02.2024 05:15:09
  • Zuletzt bearbeitet 04.06.2025 22:16:17

The 802.11 beacon handling routine failed to validate the length of an IEEE 802.11s Mesh ID before copying it to a heap-allocated buffer. While a FreeBSD Wi-Fi client is in scanning mode (i.e., not associated with a SSID) a malicious beacon frame ma...

  • EPSS 0.06%
  • Veröffentlicht 15.02.2024 05:15:09
  • Zuletzt bearbeitet 04.06.2025 21:11:31

When dumping core and saving process information, proc_getargv() might return an sbuf which have a sbuf_len() of 0 or -1, which is not properly handled. An out-of-bound read can happen when user constructs a specially crafted ps_string, which in tur...

  • EPSS 0.05%
  • Veröffentlicht 15.02.2024 05:15:08
  • Zuletzt bearbeitet 09.12.2024 17:27:41

The total size of the user-provided nmreq to nmreq_copyin() was first computed and then trusted during the copyin. This time-of-check to time-of-use bug could lead to kernel memory corruption. On systems configured to include netmap in their devfs_...