Freebsd

Freebsd

527 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 15.02.2024 05:15:09
  • Zuletzt bearbeitet 04.06.2025 21:11:31

When dumping core and saving process information, proc_getargv() might return an sbuf which have a sbuf_len() of 0 or -1, which is not properly handled. An out-of-bound read can happen when user constructs a specially crafted ps_string, which in tur...

  • EPSS 0.05%
  • Veröffentlicht 15.02.2024 05:15:08
  • Zuletzt bearbeitet 09.12.2024 17:27:41

The total size of the user-provided nmreq to nmreq_copyin() was first computed and then trusted during the copyin. This time-of-check to time-of-use bug could lead to kernel memory corruption. On systems configured to include netmap in their devfs_...

Exploit
  • EPSS 0.84%
  • Veröffentlicht 24.12.2023 06:15:07
  • Zuletzt bearbeitet 21.11.2024 08:38:44

sendmail through 8.17.2 allows SMTP smuggling in certain configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occu...

Medienbericht Exploit
  • EPSS 50.71%
  • Veröffentlicht 18.12.2023 16:15:10
  • Zuletzt bearbeitet 12.05.2026 11:16:15

The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client a...

  • EPSS 0.26%
  • Veröffentlicht 13.12.2023 09:15:34
  • Zuletzt bearbeitet 21.11.2024 08:44:02

In versions of FreeBSD 14.0-RELEASE before 14-RELEASE-p2, FreeBSD 13.2-RELEASE before 13.2-RELEASE-p7 and FreeBSD 12.4-RELEASE before 12.4-RELEASE-p9, the pf(4) packet filter incorrectly validates TCP sequence numbers.  This could allow a malicious a...

  • EPSS 0.3%
  • Veröffentlicht 13.12.2023 09:15:34
  • Zuletzt bearbeitet 21.11.2024 08:44:18

When a program running on an affected system appends data to a file via an NFS client mount, the bug can cause the NFS client to fail to copy in the data to be written but proceed as though the copy operation had succeeded. This means that the data ...

  • EPSS 0.87%
  • Veröffentlicht 08.11.2023 09:15:07
  • Zuletzt bearbeitet 21.11.2024 08:42:49

In versions of FreeBSD 12.4-RELEASE prior to 12.4-RELEASE-p7 and FreeBSD 13.2-RELEASE prior to 13.2-RELEASE-p5 the __sflush() stdio function in libc does not correctly update FILE objects' write space members for write-buffered streams when the write...

  • EPSS 0.16%
  • Veröffentlicht 08.11.2023 09:15:07
  • Zuletzt bearbeitet 21.11.2024 08:42:54

In versions of FreeBSD 13-RELEASE before 13-RELEASE-p5, under certain circumstances the cap_net libcasper(3) service incorrectly validates that updated constraints are strictly subsets of the active constraints.  When only a list of resolvable domain...

  • EPSS 0.14%
  • Veröffentlicht 04.10.2023 04:15:15
  • Zuletzt bearbeitet 21.11.2024 08:41:37

On CPU 0 the check for the SMCCC workaround is called before SMCCC support has been initialized. This resulted in no speculative execution workarounds being installed on CPU 0.

  • EPSS 0.13%
  • Veröffentlicht 04.10.2023 04:15:14
  • Zuletzt bearbeitet 21.11.2024 08:41:37

On an msdosfs filesystem, the 'truncate' or 'ftruncate' system calls under certain circumstances populate the additional space in the file with unallocated data from the underlying disk device, rather than zero bytes. This may permit a user with wri...