Show filters
961 Total Results
Displaying 71-80 of 961
Sort by:
Attacker Value
Unknown
CVE-2023-5370
Disclosure Date: October 04, 2023 (last updated October 11, 2023)
On CPU 0 the check for the SMCCC workaround is called before SMCCC support has been initialized. This resulted in no speculative execution workarounds being installed on CPU 0.
0
Attacker Value
Unknown
CVE-2023-5369
Disclosure Date: October 04, 2023 (last updated October 11, 2023)
Before correction, the copy_file_range system call checked only for the CAP_READ and CAP_WRITE capabilities on the input and output file descriptors, respectively. Using an offset is logically equivalent to seeking, and the system call must additionally require the CAP_SEEK capability.
This incorrect privilege check enabled sandboxed processes with only read or write but no seek capability on a file descriptor to read data from or write data to an arbitrary location within the file corresponding to that file descriptor.
0
Attacker Value
Unknown
CVE-2023-5368
Disclosure Date: October 04, 2023 (last updated November 29, 2023)
On an msdosfs filesystem, the 'truncate' or 'ftruncate' system calls under certain circumstances populate the additional space in the file with unallocated data from the underlying disk device, rather than zero bytes.
This may permit a user with write access to files on a msdosfs filesystem to read unintended data (e.g. from a previously deleted file).
0
Attacker Value
Unknown
CVE-2023-4809
Disclosure Date: September 06, 2023 (last updated February 14, 2025)
In pf packet processing with a 'scrub fragment reassemble' rule, a packet containing multiple IPv6 fragment headers would be reassembled, and then immediately processed. That is, a packet with multiple fragment extension headers would not be recognized as the correct ultimate payload. Instead a packet with multiple IPv6 fragment headers would unexpectedly be interpreted as a fragmented packet, rather than as whatever the real payload is.
As a result, IPv6 fragments may bypass pf firewall rules written on the assumption all fragments have been reassembled and, as a result, be forwarded or processed by the host.
0
Attacker Value
Unknown
CVE-2023-40216
Disclosure Date: August 10, 2023 (last updated October 08, 2023)
OpenBSD 7.3 before errata 014 is missing an argument-count bounds check in console terminal emulation. This could cause incorrect memory access and a kernel crash after receiving crafted DCS or CSI terminal escape sequences.
0
Attacker Value
Unknown
CVE-2023-3494
Disclosure Date: August 01, 2023 (last updated February 14, 2025)
The fwctl driver implements a state machine which is executed when a bhyve guest accesses certain x86 I/O ports. The interface lets the guest copy a string into a buffer resident in the bhyve process' memory. A bug in the state machine implementation can result in a buffer overflowing when copying this string. Malicious, privileged software running in a guest VM can exploit the buffer overflow to achieve code execution on the host in the bhyve userspace process, which typically runs as root, mitigated by the capabilities assigned through the Capsicum sandbox available to the bhyve process.
0
Attacker Value
Unknown
CVE-2023-3107
Disclosure Date: August 01, 2023 (last updated February 14, 2025)
A set of carefully crafted ipv6 packets can trigger an integer overflow in the calculation of a fragment reassembled packet's payload length field. This allows an attacker to trigger a kernel panic, resulting in a denial of service.
0
Attacker Value
Unknown
CVE-2023-3326
Disclosure Date: June 22, 2023 (last updated October 08, 2023)
pam_krb5 authenticates a user by essentially running kinit with the password, getting a ticket-granting ticket (tgt) from the Kerberos KDC (Key Distribution Center) over the network, as a way to verify the password. However, if a keytab is not provisioned on the system, pam_krb5 has no way to validate the response from the KDC, and essentially trusts the tgt provided over the network as being valid. In a non-default FreeBSD installation that leverages pam_krb5 for authentication and does not have a keytab provisioned, an attacker that is able to control both the password and the KDC responses can return a valid tgt, allowing authentication to occur for any user on the system.
0
Attacker Value
Unknown
CVE-2023-35784
Disclosure Date: June 16, 2023 (last updated October 08, 2023)
A double free or use after free could occur after SSL_clear in OpenBSD 7.2 before errata 026 and 7.3 before errata 004, and in LibreSSL before 3.6.3 and 3.7.x before 3.7.3. NOTE: OpenSSL is not affected.
0
Attacker Value
Unknown
CVE-2021-46880
Disclosure Date: April 15, 2023 (last updated October 08, 2023)
x509/x509_verify.c in LibreSSL before 3.4.2, and OpenBSD before 7.0 errata 006, allows authentication bypass because an error for an unverified certificate chain is sometimes discarded.
0