Show filters
961 Total Results
Displaying 31-40 of 961
Sort by:
Attacker Value
Unknown

CVE-2024-39281

Disclosure Date: November 12, 2024 (last updated November 13, 2024)
The command ctl_persistent_reserve_out allows the caller to specify an arbitrary size which will be passed to the kernel's memory allocator.
0
Attacker Value
Unknown

CVE-2024-41721

Disclosure Date: September 20, 2024 (last updated September 20, 2024)
An insufficient boundary validation in the USB code could lead to an out-of-bounds read on the heap, which could potentially lead to an arbitrary write and remote code execution.
0
Attacker Value
Unknown

CVE-2024-8178

Disclosure Date: September 05, 2024 (last updated September 06, 2024)
The ctl_write_buffer and ctl_read_buffer functions allocated memory to be returned to userspace, without initializing it. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process. A malicious iSCSI initiator could achieve remote code execution on the iSCSI target host.
Attacker Value
Unknown

CVE-2024-45063

Disclosure Date: September 05, 2024 (last updated September 06, 2024)
The function ctl_write_buffer incorrectly set a flag which resulted in a kernel Use-After-Free when a command finished processing. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process. A malicious iSCSI initiator could achieve remote code execution on the iSCSI target host.
Attacker Value
Unknown

CVE-2024-43110

Disclosure Date: September 05, 2024 (last updated September 06, 2024)
The ctl_request_sense function could expose up to three bytes of the kernel heap to userspace. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process. A malicious iSCSI initiator could achieve remote code execution on the iSCSI target host.
Attacker Value
Unknown

CVE-2024-43102

Disclosure Date: September 05, 2024 (last updated September 06, 2024)
Concurrent removals of certain anonymous shared memory mappings by using the UMTX_SHM_DESTROY sub-request of UMTX_OP_SHM can lead to decreasing the reference count of the object representing the mapping too many times, causing it to be freed too early. A malicious code exercizing the UMTX_SHM_DESTROY sub-request in parallel can panic the kernel or enable further Use-After-Free attacks, potentially including code execution or Capsicum sandbox escape.
Attacker Value
Unknown

CVE-2024-42416

Disclosure Date: September 05, 2024 (last updated September 06, 2024)
The ctl_report_supported_opcodes function did not sufficiently validate a field provided by userspace, allowing an arbitrary write to a limited amount of kernel help memory. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process. A malicious iSCSI initiator could achieve remote code execution on the iSCSI target host.
Attacker Value
Unknown

CVE-2024-32668

Disclosure Date: September 05, 2024 (last updated September 06, 2024)
An insufficient boundary validation in the USB code could lead to an out-of-bounds write on the heap, with data controlled by the caller. A malicious, privileged software running in a guest VM can exploit the vulnerability to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process.
Attacker Value
Unknown

CVE-2024-45288

Disclosure Date: September 05, 2024 (last updated September 05, 2024)
A missing null-termination character in the last element of an nvlist array string can lead to writing outside the allocated buffer.
0
Attacker Value
Unknown

CVE-2024-45287

Disclosure Date: September 05, 2024 (last updated September 07, 2024)
A malicious value of size in a structure of packed libnv can cause an integer overflow, leading to the allocation of a smaller buffer than required for the parsed data.