CVE-2023-6534
- EPSS 0.26%
- Veröffentlicht 13.12.2023 09:15:34
- Zuletzt bearbeitet 21.11.2024 08:44:02
In versions of FreeBSD 14.0-RELEASE before 14-RELEASE-p2, FreeBSD 13.2-RELEASE before 13.2-RELEASE-p7 and FreeBSD 12.4-RELEASE before 12.4-RELEASE-p9, the pf(4) packet filter incorrectly validates TCP sequence numbers. This could allow a malicious a...
CVE-2023-6660
- EPSS 0.3%
- Veröffentlicht 13.12.2023 09:15:34
- Zuletzt bearbeitet 21.11.2024 08:44:18
When a program running on an affected system appends data to a file via an NFS client mount, the bug can cause the NFS client to fail to copy in the data to be written but proceed as though the copy operation had succeeded. This means that the data ...
CVE-2023-5941
- EPSS 0.67%
- Veröffentlicht 08.11.2023 09:15:07
- Zuletzt bearbeitet 21.11.2024 08:42:49
In versions of FreeBSD 12.4-RELEASE prior to 12.4-RELEASE-p7 and FreeBSD 13.2-RELEASE prior to 13.2-RELEASE-p5 the __sflush() stdio function in libc does not correctly update FILE objects' write space members for write-buffered streams when the write...
CVE-2023-5978
- EPSS 0.16%
- Veröffentlicht 08.11.2023 09:15:07
- Zuletzt bearbeitet 21.11.2024 08:42:54
In versions of FreeBSD 13-RELEASE before 13-RELEASE-p5, under certain circumstances the cap_net libcasper(3) service incorrectly validates that updated constraints are strictly subsets of the active constraints. When only a list of resolvable domain...
CVE-2023-5370
- EPSS 0.14%
- Veröffentlicht 04.10.2023 04:15:15
- Zuletzt bearbeitet 21.11.2024 08:41:37
On CPU 0 the check for the SMCCC workaround is called before SMCCC support has been initialized. This resulted in no speculative execution workarounds being installed on CPU 0.
CVE-2023-5368
- EPSS 0.13%
- Veröffentlicht 04.10.2023 04:15:14
- Zuletzt bearbeitet 21.11.2024 08:41:37
On an msdosfs filesystem, the 'truncate' or 'ftruncate' system calls under certain circumstances populate the additional space in the file with unallocated data from the underlying disk device, rather than zero bytes. This may permit a user with wri...
CVE-2023-5369
- EPSS 0.1%
- Veröffentlicht 04.10.2023 04:15:14
- Zuletzt bearbeitet 21.11.2024 08:41:37
Before correction, the copy_file_range system call checked only for the CAP_READ and CAP_WRITE capabilities on the input and output file descriptors, respectively. Using an offset is logically equivalent to seeking, and the system call must addition...
CVE-2023-4809
- EPSS 0.48%
- Veröffentlicht 06.09.2023 20:15:08
- Zuletzt bearbeitet 13.02.2025 18:15:47
In pf packet processing with a 'scrub fragment reassemble' rule, a packet containing multiple IPv6 fragment headers would be reassembled, and then immediately processed. That is, a packet with multiple fragment extension headers would not be recogni...
CVE-2023-3494
- EPSS 0.19%
- Veröffentlicht 01.08.2023 23:15:31
- Zuletzt bearbeitet 13.02.2025 17:16:57
The fwctl driver implements a state machine which is executed when a bhyve guest accesses certain x86 I/O ports. The interface lets the guest copy a string into a buffer resident in the bhyve process' memory. A bug in the state machine implementati...
CVE-2023-3107
- EPSS 0.21%
- Veröffentlicht 01.08.2023 23:15:30
- Zuletzt bearbeitet 09.07.2025 14:15:26
A set of carefully crafted ipv6 packets can trigger an integer overflow in the calculation of a fragment reassembled packet's payload length field. This allows an attacker to trigger a kernel panic, resulting in a denial of service.