Show filters
782 Total Results
Displaying 21-30 of 782
Sort by:
Attacker Value
Unknown

CVE-2024-45289

Disclosure Date: November 12, 2024 (last updated November 13, 2024)
The fetch(3) library uses environment variables for passing certain information, including the revocation file pathname. The environment variable name used by fetch(1) to pass the filename to the library was incorrect, in effect ignoring the option. Fetch would still connect to a host presenting a certificate included in the revocation file passed to the --crl option.
0
Attacker Value
Unknown

CVE-2024-39281

Disclosure Date: November 12, 2024 (last updated November 13, 2024)
The command ctl_persistent_reserve_out allows the caller to specify an arbitrary size which will be passed to the kernel's memory allocator.
0
Attacker Value
Unknown

CVE-2024-41721

Disclosure Date: September 20, 2024 (last updated September 20, 2024)
An insufficient boundary validation in the USB code could lead to an out-of-bounds read on the heap, which could potentially lead to an arbitrary write and remote code execution.
0
Attacker Value
Unknown

CVE-2024-8178

Disclosure Date: September 05, 2024 (last updated September 06, 2024)
The ctl_write_buffer and ctl_read_buffer functions allocated memory to be returned to userspace, without initializing it. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process. A malicious iSCSI initiator could achieve remote code execution on the iSCSI target host.
Attacker Value
Unknown

CVE-2024-45063

Disclosure Date: September 05, 2024 (last updated September 06, 2024)
The function ctl_write_buffer incorrectly set a flag which resulted in a kernel Use-After-Free when a command finished processing. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process. A malicious iSCSI initiator could achieve remote code execution on the iSCSI target host.
Attacker Value
Unknown

CVE-2024-43110

Disclosure Date: September 05, 2024 (last updated September 06, 2024)
The ctl_request_sense function could expose up to three bytes of the kernel heap to userspace. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process. A malicious iSCSI initiator could achieve remote code execution on the iSCSI target host.
Attacker Value
Unknown

CVE-2024-43102

Disclosure Date: September 05, 2024 (last updated September 06, 2024)
Concurrent removals of certain anonymous shared memory mappings by using the UMTX_SHM_DESTROY sub-request of UMTX_OP_SHM can lead to decreasing the reference count of the object representing the mapping too many times, causing it to be freed too early. A malicious code exercizing the UMTX_SHM_DESTROY sub-request in parallel can panic the kernel or enable further Use-After-Free attacks, potentially including code execution or Capsicum sandbox escape.
Attacker Value
Unknown

CVE-2024-42416

Disclosure Date: September 05, 2024 (last updated September 06, 2024)
The ctl_report_supported_opcodes function did not sufficiently validate a field provided by userspace, allowing an arbitrary write to a limited amount of kernel help memory. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process. A malicious iSCSI initiator could achieve remote code execution on the iSCSI target host.
Attacker Value
Unknown

CVE-2024-32668

Disclosure Date: September 05, 2024 (last updated September 06, 2024)
An insufficient boundary validation in the USB code could lead to an out-of-bounds write on the heap, with data controlled by the caller. A malicious, privileged software running in a guest VM can exploit the vulnerability to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process.
Attacker Value
Unknown

CVE-2024-45288

Disclosure Date: September 05, 2024 (last updated September 05, 2024)
A missing null-termination character in the last element of an nvlist array string can lead to writing outside the allocated buffer.
0