Freebsd

Freebsd

21 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 3.98%
  • Veröffentlicht 15.02.2024 06:15:45
  • Zuletzt bearbeitet 04.06.2025 22:15:09

ping reads raw IP packets from the network to process responses in the pr_pack() function. As part of processing a response ping has to reconstruct the IP header, the ICMP header and if present a "quoted packet," which represents the packet that gen...

  • EPSS 0.4%
  • Veröffentlicht 15.02.2024 06:15:45
  • Zuletzt bearbeitet 04.06.2025 22:09:43

The implementation of lib9p's handling of RWALK messages was missing a bounds check needed when unpacking the message contents. The missing check means that the receipt of a specially crafted message will cause lib9p to overwrite unrelated memory. ...

  • EPSS 0.04%
  • Veröffentlicht 15.02.2024 06:15:45
  • Zuletzt bearbeitet 04.06.2025 22:09:07

A particular case of memory sharing is mishandled in the virtual memory system. This is very similar to SA-21:08.vm, but with a different root cause. An unprivileged local user process can maintain a mapping of a page after it is freed, allowing th...

  • EPSS 0.27%
  • Veröffentlicht 15.02.2024 06:15:45
  • Zuletzt bearbeitet 04.06.2025 21:59:04

The aio_aqueue function, used by the lio_listio system call, fails to release a reference to a credential in an error case. An attacker may cause the reference count to overflow, leading to a use after free (UAF).

  • EPSS 0.12%
  • Veröffentlicht 15.02.2024 05:15:11
  • Zuletzt bearbeitet 04.06.2025 21:55:22

The jail(2) system call has not limited a visiblity of allocated TTYs (the kern.ttys sysctl). This gives rise to an information leak about processes outside the current jail. Attacker can get information about TTYs allocated on the host or in other...

  • EPSS 0.23%
  • Veröffentlicht 15.02.2024 05:15:11
  • Zuletzt bearbeitet 04.06.2025 21:24:01

`bhyveload -h <host-path>` may be used to grant loader access to the <host-path> directory tree on the host. Affected versions of bhyveload(8) do not make any attempt to restrict loader's access to <host-path>, allowing the loader to read any file t...

  • EPSS 0.06%
  • Veröffentlicht 15.02.2024 05:15:09
  • Zuletzt bearbeitet 04.06.2025 21:11:31

When dumping core and saving process information, proc_getargv() might return an sbuf which have a sbuf_len() of 0 or -1, which is not properly handled. An out-of-bound read can happen when user constructs a specially crafted ps_string, which in tur...

  • EPSS 7.85%
  • Veröffentlicht 15.02.2024 05:15:09
  • Zuletzt bearbeitet 04.06.2025 22:16:17

The 802.11 beacon handling routine failed to validate the length of an IEEE 802.11s Mesh ID before copying it to a heap-allocated buffer. While a FreeBSD Wi-Fi client is in scanning mode (i.e., not associated with a SSID) a malicious beacon frame ma...

  • EPSS 0.55%
  • Veröffentlicht 12.02.2019 05:29:00
  • Zuletzt bearbeitet 21.11.2024 04:45:12

In FreeBSD 11.2-STABLE after r338618 and before r343786, 12.0-STABLE before r343781, and 12.0-RELEASE before 12.0-RELEASE-p3, a bug in the reference count implementation for UNIX domain sockets can cause a file structure to be incorrectly released po...

  • EPSS 0.06%
  • Veröffentlicht 12.02.2019 05:29:00
  • Zuletzt bearbeitet 21.11.2024 04:45:12

In FreeBSD before 11.2-STABLE(r343782), 11.2-RELEASE-p9, 12.0-STABLE(r343781), and 12.0-RELEASE-p3, kernel callee-save registers are not properly sanitized before return from system calls, potentially allowing some kernel data used in the system call...