FreeBSD Unix OS
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in FreeBSD.
FreeBSD EOL Dates
Ensure that you are using a supported version of FreeBSD. Here are some end of life, and end of support dates for FreeBSD.
| Release | EOL Date | Status |
|---|---|---|
| 14.4 | December 31, 2026 |
EOL This Year
FreeBSD 14.4 will become EOL this year, in December 2026. |
| 15.0 | September 30, 2026 |
EOL This Year
FreeBSD 15.0 will become EOL this year, in September 2026. |
| 15.0 | September 30, 2026 |
EOL This Year
FreeBSD 15.0 will become EOL this year, in September 2026. |
| 14.3 | June 30, 2026 |
EOL This Year
FreeBSD 14.3 will become EOL this year, in June 2026. |
| 13.5 | April 30, 2026 |
EOL This Year
FreeBSD 13.5 will become EOL this year, in April 2026. |
| releng/13.5 | April 30, 2026 |
EOL This Year
FreeBSD releng/13.5 will become EOL this year, in April 2026. |
| releng/14.2 | September 30, 2025 |
EOL
FreeBSD releng/14.2 became EOL in 2025. |
| 14.2 | September 30, 2025 |
EOL
FreeBSD 14.2 became EOL in 2025. |
| 13.4 | June 30, 2025 |
EOL
FreeBSD 13.4 became EOL in 2025. |
| releng/13.4 | June 30, 2025 |
EOL
FreeBSD releng/13.4 became EOL in 2025. |
| releng/14.1 | March 31, 2025 |
EOL
FreeBSD releng/14.1 became EOL in 2025. |
| 14.1 | March 31, 2025 |
EOL
FreeBSD 14.1 became EOL in 2025. |
| releng/13.3 | December 31, 2024 |
EOL
FreeBSD releng/13.3 became EOL in 2024. |
| 13.3 | December 31, 2024 |
EOL
FreeBSD 13.3 became EOL in 2024. |
| stable/14 | November 30, 2028 |
Active
FreeBSD stable/14 will become EOL in two years (in 2028). |
| 14 | November 30, 2028 |
Active
FreeBSD 14 will become EOL in two years (in 2028). |
| releng/14.0 | September 30, 2024 |
EOL
FreeBSD releng/14.0 became EOL in 2024. |
| 14 | November 30, 2028 |
Active
FreeBSD 14 will become EOL in two years (in 2028). |
| releng/13.2 | June 30, 2024 |
EOL
FreeBSD releng/13.2 became EOL in 2024. |
| 13.2 | June 30, 2024 |
EOL
FreeBSD 13.2 became EOL in 2024. |
By the Year
In 2026 there have been 6 vulnerabilities in FreeBSD with an average score of 7.7 out of ten. Last year, in 2025 FreeBSD had 1 security vulnerability published. That is, 5 more vulnerabilities have already been reported in 2026 as compared to last year. However, the average CVE base score of the vulnerabilities in 2026 is greater by 2.27.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 6 | 7.67 |
| 2025 | 1 | 5.40 |
| 2024 | 29 | 7.82 |
| 2023 | 14 | 7.26 |
| 2022 | 2 | 7.50 |
| 2021 | 24 | 7.08 |
| 2020 | 27 | 7.28 |
| 2019 | 25 | 8.01 |
| 2018 | 26 | 7.23 |
It may take a day or so for new FreeBSD vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent FreeBSD Security Vulnerabilities
FreeBSD Kernel: rtsock_msg_buffer Stack Canary Overflow Crash
CVE-2026-3038
7.5 - High
- March 09, 2026
The rtsock_msg_buffer() function serializes routing information into a buffer. As a part of this, it copies sockaddr structures into a sockaddr_storage structure on the stack. It assumes that the source sockaddr length field had already been validated, but this is not necessarily the case, and it's possible for a malicious userspace program to craft a request which triggers a 127-byte overflow. In practice, this overflow immediately overwrites the canary for the rtsock_msg_buffer() stack frame, resulting in a panic once the function returns. The bug allows an unprivileged user to crash the kernel by triggering a stack buffer overflow in rtsock_msg_buffer(). In particular, the overflow will corrupt a stack canary value that is verified when the function returns; this mitigates the impact of the stack overflow by triggering a kernel panic. Other kernel bugs may exist which allow userspace to find the canary value and thus defeat the mitigation, at which point local privilege escalation may be possible.
Memory Corruption
Blocklistd FD Leak Null Deref Crash Denies IP Blocking
CVE-2026-2261
7.5 - High
- March 09, 2026
Due to a programming error, blocklistd leaks a socket descriptor for each adverse event report it receives. Once a certain number of leaked sockets is reached, blocklistd becomes unable to run the helper script: a child process is forked, but this child dereferences a null pointer and crashes before it is able to exec the helper. At this point, blocklistd still records adverse events but is unable to block new addresses or unblock addresses whose database entries have expired. Once a second, much higher number of leaked sockets is reached, blocklistd becomes unable to receive new adverse event reports. An attacker may take advantage of this by triggering a large number of adverse events from sacrificial IP addresses to effectively disable blocklistd before launching an attack. Even in the absence of attacks or probes by would-be attackers, adverse events will occur regularly in the course of normal operations, and blocklistd will gradually run out file descriptors and become ineffective. The accumulation of open sockets may have knock-on effects on other parts of the system, resulting in a general slowdown until blocklistd is restarted.
Missing Release of Resource after Effective Lifetime
FreeBSD Jail nullfs FD Exchange Exploit Bypass Jail Root
CVE-2025-15576
7.5 - High
- March 09, 2026
If two sibling jails are restricted to separate filesystem trees, which is to say that neither of the two jail root directories is an ancestor of the other, jailed processes may nonetheless be able to access a shared directory via a nullfs mount, if the administrator has configured one. In this case, cooperating processes in the two jails may establish a connection using a unix domain socket and exchange directory descriptors with each other. When performing a filesystem name lookup, at each step of the lookup, the kernel checks whether the lookup would descend below the jail root of the current process. If the jail root directory is not encountered, the lookup continues. In a configuration where processes in two different jails are able to exchange file descriptors using a unix domain socket, it is possible for a jailed process to receive a directory for a descriptor that is below that process' jail root. This enables full filesystem access for a jailed process, breaking the chroot. Note that the system administrator is still responsible for ensuring that an unprivileged user on the jail host is not able to pass directory descriptors to a jailed process, even in a patched kernel.
Improper Privilege Management
FreeBSD Jail nullfs Mount Escape via Path Lookup
CVE-2025-15547
8.8 - High
- March 09, 2026
By default, jailed processes cannot mount filesystems, including nullfs(4). However, the allow.mount.nullfs option enables mounting nullfs filesystems, subject to privilege checks. If a privileged user within a jail is able to nullfs-mount directories, a limitation of the kernel's path lookup logic allows that user to escape the jail's chroot, yielding access to the full filesystem of the host or parent jail. In a jail configured to allow nullfs(4) mounts from within the jail, the jailed root user can escape the jail's filesystem root.
Improper Privilege Management
FreeBSD Pf tcp-setmss Null Deref DoS via Rule Engine Bypass
CVE-2025-14769
7.5 - High
- March 09, 2026
In some cases, the `tcp-setmss` handler may free the packet data and throw an error without halting the rule processing engine. A subsequent rule can then allow the traffic after the packet data is gone, resulting in a NULL pointer dereference. Maliciously crafted packets sent from a remote host may result in a Denial of Service (DoS) if the `tcp-setmss` directive is used and a subsequent rule would allow the traffic to pass.
NULL Pointer Dereference
FreeBSD rtsol/rtsold: RTA Domain Search Input Injection Enables Shell Cmd Exec
CVE-2025-14558
7.2 - High
- March 09, 2026
The rtsol(8) and rtsold(8) programs do not validate the domain search list options provided in router advertisement messages; the option body is passed to resolvconf(8) unmodified. resolvconf(8) is a shell script which does not validate its input. A lack of quoting meant that shell commands pass as input to resolvconf(8) may be executed.
Improper Input Validation
Linux Kernel SO_REUSEPORT_LB Spoofing via LoadBalancer Grouping
CVE-2025-24934
5.4 - Medium
- October 22, 2025
Software which sets SO_REUSEPORT_LB on a socket and then connects it to a host will not directly observe any problems. However, due to its membership in a load-balancing group, that socket will receive packets originating from any host. This breaks the contract of the connect(2) and implied connect via sendto(2), and may leave the application vulnerable to spoofing attacks. The kernel failed to check the connection state of sockets when adding them to load-balancing groups. Furthermore, when looking up the destination socket for an incoming packet, the kernel will match a socket belonging to a load-balancing group even if it is connected, in violation of the contract that connected sockets are only supposed to receive packets originating from the connected host.
Exposure of Data Element to Wrong Session
NVMe Driver nvme_opc_get_log_page Buffer Over-Read CVE-2024-51562
CVE-2024-51562
6.5 - Medium
- November 12, 2024
The NVMe driver function nvme_opc_get_log_page is vulnerable to a buffer over-read from a guest-controlled value.
Out-of-bounds Read
Linux Kernel virtio_vq_recordon TOCTOU race condition
CVE-2024-51563
6.5 - Medium
- November 12, 2024
The virtio_vq_recordon function is subject to a time-of-check to time-of-use (TOCTOU) race condition.
TOCTTOU
Linux Kernel HDA Audio Driver Infinite Loop
CVE-2024-51564
7.5 - High
- November 12, 2024
A guest can trigger an infinite loop in the hda audio driver.
Improper Validation of Specified Index, Position, or Offset in Input
Linux HDA Driver Buffer Over-Read via Guest-Controlled Value (CVE)
CVE-2024-51565
6.5 - Medium
- November 12, 2024
The hda driver is vulnerable to a buffer over-read from a guest-controlled value.
Out-of-bounds Read
Guest-Induced Infinite Loop in Windows NVMe.sys Queue Processing
CVE-2024-51566
6.5 - Medium
- November 12, 2024
The NVMe driver queue processing is vulernable to guest-induced infinite loops.
Improper Validation of Specified Index, Position, or Offset in Input
bhyve virtio_scsi Use-After-Free in ctl_write_buffer enabling RCE via guest VM
CVE-2024-45063
9.8 - Critical
- September 05, 2024
The function ctl_write_buffer incorrectly set a flag which resulted in a kernel Use-After-Free when a command finished processing. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process. A malicious iSCSI initiator could achieve remote code execution on the iSCSI target host.
Dangling pointer
bhyve virtio_scsi Buffer Uninit RCE via Guest VM
CVE-2024-8178
9.3 - Critical
- September 05, 2024
The ctl_write_buffer and ctl_read_buffer functions allocated memory to be returned to userspace, without initializing it. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process. A malicious iSCSI initiator could achieve remote code execution on the iSCSI target host.
Use of Uninitialized Resource
bhyve Virtio_SCSI Heap Leak Enables Host RCE (CVE-2024-43110)
CVE-2024-43110
8.4 - High
- September 05, 2024
The ctl_request_sense function could expose up to three bytes of the kernel heap to userspace. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process. A malicious iSCSI initiator could achieve remote code execution on the iSCSI target host.
Out-of-bounds Read
FreeBSD UMTX SHM_DESTROY UAF Leading to Kernel Panic
CVE-2024-43102
10 - Critical
- September 05, 2024
Concurrent removals of certain anonymous shared memory mappings by using the UMTX_SHM_DESTROY sub-request of UMTX_OP_SHM can lead to decreasing the reference count of the object representing the mapping too many times, causing it to be freed too early. A malicious code exercizing the UMTX_SHM_DESTROY sub-request in parallel can panic the kernel or enable further Use-After-Free attacks, potentially including code execution or Capsicum sandbox escape.
Dangling pointer
bhyve virtio_scsi ctl_report_supported_opcodes Arbitrary Write Host Exec
CVE-2024-42416
8.4 - High
- September 05, 2024
The ctl_report_supported_opcodes function did not sufficiently validate a field provided by userspace, allowing an arbitrary write to a limited amount of kernel help memory. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process. A malicious iSCSI initiator could achieve remote code execution on the iSCSI target host.
Improper Filtering of Special Elements
bhyve USB Out-of-bounds Heap Write Leads to Host Privilege Escalation
CVE-2024-32668
8.2 - High
- September 05, 2024
An insufficient boundary validation in the USB code could lead to an out-of-bounds write on the heap, with data controlled by the caller. A malicious, privileged software running in a guest VM can exploit the vulnerability to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process.
Memory Corruption
Integer Overflow in libnv Size Field Leads to Small Buffer Allocation
CVE-2024-45287
7.5 - High
- September 05, 2024
A malicious value of size in a structure of packed libnv can cause an integer overflow, leading to the allocation of a smaller buffer than required for the parsed data.
Integer Overflow or Wraparound
OpenSSH async-signal-safe race in sshd: RCE as root
CVE-2024-7589
8.1 - High
- August 12, 2024
A signal handler in sshd(8) may call a logging function that is not async-signal-safe. The signal handler is invoked when a client does not authenticate within the LoginGraceTime seconds (120 by default). This signal handler executes in the context of the sshd(8)'s privileged code, which is not sandboxed and runs with full root privileges. This issue is another instance of the problem in CVE-2024-6387 addressed by FreeBSD-SA-24:04.openssh. The faulty code in this case is from the integration of blacklistd in OpenSSH in FreeBSD. As a result of calling functions that are not async-signal-safe in the privileged sshd(8) context, a race condition exists that a determined attacker may be able to exploit to allow an unauthenticated remote code execution as root.
Race Condition
Linux Kernel Tracing Bypass for SetUID Programs
CVE-2024-6760
7.5 - High
- August 12, 2024
A logic bug in the code which disables kernel tracing for setuid programs meant that tracing was not disabled when it should have, allowing unprivileged users to trace and inspect the behavior of setuid programs. The bug may be used by an unprivileged user to read the contents of files to which they would not otherwise have access, such as the local password database.
NFS Path Separator Sanitization Flaw CVE-2024-6759 (Linux Kernel)
CVE-2024-6759
5.3 - Medium
- August 12, 2024
When mounting a remote filesystem using NFS, the kernel did not sanitize remotely provided filenames for the path separator character, "/". This allows readdir(3) and related functions to return filesystem entries with names containing additional path components. The lack of validation described above gives rise to a confused deputy problem. For example, a program copying files from an NFS mount could be tricked into copying from outside the intended source directory, and/or to a location outside the intended destination directory.
Directory traversal
OpenSSH Race Condition leading to RCE, known as regreSSHion
CVE-2024-6387
8.1 - High
- July 01, 2024
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
Signal Handler Race Condition
OpenBSD NFS Remote Code Exec CVE-2024-29937 in 7.4
CVE-2024-29937
- April 11, 2024
NFS in a BSD derived codebase, as used in OpenBSD through 7.4 and FreeBSD through 14.0-RELEASE, allows remote attackers to execute arbitrary code via a bug that is unrelated to memory corruption.
FreeBSD Ping IP Header Processing Buffer Overflow (CVE-2022-23093)
CVE-2022-23093
- February 15, 2024
ping reads raw IP packets from the network to process responses in the pr_pack() function. As part of processing a response ping has to reconstruct the IP header, the ICMP header and if present a "quoted packet," which represents the packet that generated an ICMP error. The quoted packet again has an IP header and an ICMP header. The pr_pack() copies received IP and ICMP headers into stack buffers for further processing. In so doing, it fails to take into account the possible presence of IP option headers following the IP header in either the response or the quoted packet. When IP options are present, pr_pack() overflows the destination buffer by up to 40 bytes. The memory safety bugs described above can be triggered by a remote host, causing the ping program to crash. The ping process runs in a capability mode sandbox on all affected versions of FreeBSD and is thus very constrained in how it can interact with the rest of the system at the point where the bug can occur.
lib9p RWALK bounds-check flaw enables bhyve guest to overwrite host memory
CVE-2022-23092
- February 15, 2024
The implementation of lib9p's handling of RWALK messages was missing a bounds check needed when unpacking the message contents. The missing check means that the receipt of a specially crafted message will cause lib9p to overwrite unrelated memory. The bug can be triggered by a malicious bhyve guest kernel to overwrite memory in the bhyve(8) process. This could potentially lead to user-mode code execution on the host, subject to bhyve's Capsicum sandbox.
Linux Kernel UAF via lio_listio aio_aqueue Refcnt Overflow
CVE-2022-23090
- February 15, 2024
The aio_aqueue function, used by the lio_listio system call, fails to release a reference to a credential in an error case. An attacker may cause the reference count to overflow, leading to a use after free (UAF).
Linux kernel: UAF in VM mapping leaks kernel data
CVE-2022-23091
- February 15, 2024
A particular case of memory sharing is mishandled in the virtual memory system. This is very similar to SA-21:08.vm, but with a different root cause. An unprivileged local user process can maintain a mapping of a page after it is freed, allowing that process to read private data belonging to other processes or the kernel.
E1000 on bhyve: unchecked checksum offload leads to host memory overwrite
CVE-2022-23087
8.8 - High
- February 15, 2024
The e1000 network adapters permit a variety of modifications to an Ethernet packet when it is being transmitted. These include the insertion of IP and TCP checksums, insertion of an Ethernet VLAN header, and TCP segmentation offload ("TSO"). The e1000 device model uses an on-stack buffer to generate the modified packet header when simulating these modifications on transmitted packets. When checksum offload is requested for a transmitted packet, the e1000 device model used a guest-provided value to specify the checksum offset in the on-stack buffer. The offset was not validated for certain packet types. A misbehaving bhyve guest could overwrite memory in the bhyve process on the host, possibly leading to code execution in the host context. The bhyve process runs in a Capsicum sandbox, which (depending on the FreeBSD version and bhyve configuration) limits the impact of exploiting this issue.
Memory Corruption
CVE-2022-23084: Netmap Kernel TTOU Leading to Memory Corruption
CVE-2022-23084
7.5 - High
- February 15, 2024
The total size of the user-provided nmreq to nmreq_copyin() was first computed and then trusted during the copyin. This time-of-check to time-of-use bug could lead to kernel memory corruption. On systems configured to include netmap in their devfs_ruleset, a privileged process running in a jail can affect the host environment.
TOCTTOU
FreeBSD Netmap Kernel overflow triggers memory corruption
CVE-2022-23085
8.2 - High
- February 15, 2024
A user-provided integer option was passed to nmreq_copyin() without checking if it would overflow. This insufficient bounds checking could lead to kernel memory corruption. On systems configured to include netmap in their devfs_ruleset, a privileged process running in a jail can affect the host environment.
Memory Corruption
CVE-2022-23086: Heap Overflow via _CFG_PAGE IOCTL in Linux mpr/mps/mpt Drivers
CVE-2022-23086
7.8 - High
- February 15, 2024
Handlers for *_CFG_PAGE read / write ioctls in the mpr, mps, and mpt drivers allocated a buffer of a caller-specified size, but copied to it a fixed size header. Other heap content would be overwritten if the specified size was too small. Users with access to the mpr, mps or mpt device node may overwrite heap data, potentially resulting in privilege escalation. Note that the device node is only accessible to root and members of the operator group.
Memory Corruption
bhyveload Access Control Bypass via Unrestricted Host Path Access
CVE-2024-25940
- February 15, 2024
`bhyveload -h <host-path>` may be used to grant loader access to the <host-path> directory tree on the host. Affected versions of bhyveload(8) do not make any attempt to restrict loader's access to <host-path>, allowing the loader to read any file the host user has access to. In the bhyveload(8) model, the host supplies a userboot.so to boot with, but the loader scripts generally come from the guest image. A maliciously crafted script could be used to exfiltrate sensitive data from the host accessible to the user running bhyhveload(8), which is often the system root.
FreeBSD jail(2) TTY info leak via kern.ttys sysctl
CVE-2024-25941
- February 15, 2024
The jail(2) system call has not limited a visiblity of allocated TTYs (the kern.ttys sysctl). This gives rise to an information leak about processes outside the current jail. Attacker can get information about TTYs allocated on the host or in other jails. Effectively, the information printed by "pstat -t" may be leaked.
RCE in FreeBSD WiFi Client: 802.11s Mesh ID Length Validation (CVE-22-23088)
CVE-2022-23088
- February 15, 2024
The 802.11 beacon handling routine failed to validate the length of an IEEE 802.11s Mesh ID before copying it to a heap-allocated buffer. While a FreeBSD Wi-Fi client is in scanning mode (i.e., not associated with a SSID) a malicious beacon frame may overwrite kernel memory, leading to remote code execution.
Linux Kernel OOB Read via proc_getargv in ps_string
CVE-2022-23089
- February 15, 2024
When dumping core and saving process information, proc_getargv() might return an sbuf which have a sbuf_len() of 0 or -1, which is not properly handled. An out-of-bound read can happen when user constructs a specially crafted ps_string, which in turn can cause the kernel to crash.
Sendmail 8.17.2 SMTP Smuggling via Spoofed MAIL FROM Exploit (fixed 8.18)
CVE-2023-51765
5.3 - Medium
- December 24, 2023
sendmail through 8.17.2 allows SMTP smuggling in certain configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because sendmail supports <LF>.<CR><LF> but some other popular e-mail servers do not. This is resolved in 8.18 and later versions with 'o' in srv_features.
Insufficient Verification of Data Authenticity
OpenSSH <9.6 BPP handshake flaw allows integrity bypass (Terrapin attack)
CVE-2023-48795
5.9 - Medium
- December 18, 2023
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
Improper Validation of Integrity Check Value
FreeBSD PF TCP Seq Validation DoS Before 14-RELEASE-p2
CVE-2023-6534
7.5 - High
- December 13, 2023
In versions of FreeBSD 14.0-RELEASE before 14-RELEASE-p2, FreeBSD 13.2-RELEASE before 13.2-RELEASE-p7 and FreeBSD 12.4-RELEASE before 12.4-RELEASE-p9, the pf(4) packet filter incorrectly validates TCP sequence numbers. This could allow a malicious actor to execute a denial-of-service attack against hosts behind the firewall.
CVE-2023-6660: NFS Client Copy Failure Exposes Data
CVE-2023-6660
6.5 - Medium
- December 13, 2023
When a program running on an affected system appends data to a file via an NFS client mount, the bug can cause the NFS client to fail to copy in the data to be written but proceed as though the copy operation had succeeded. This means that the data to be written is instead replaced with whatever data had been in the packet buffer previously. Thus, an unprivileged user with access to an affected system may abuse the bug to trigger disclosure of sensitive information. In particular, the leak is limited to data previously stored in mbufs, which are used for network transmission and reception, and for certain types of inter-process communication. The bug can also be triggered unintentionally by system applications, in which case the data written by the application to an NFS mount may be corrupted. Corrupted data is written over the network to the NFS server, and thus also susceptible to being snooped by other hosts on the network. Note that the bug exists only in the NFS client; the version and implementation of the server has no effect on whether a given system is affected by the problem.
FreeBSD 13 Cap_NET libcasper Allows Unauth Domain Resolution
CVE-2023-5978
7.5 - High
- November 08, 2023
In versions of FreeBSD 13-RELEASE before 13-RELEASE-p5, under certain circumstances the cap_net libcasper(3) service incorrectly validates that updated constraints are strictly subsets of the active constraints. When only a list of resolvable domain names was specified without setting any other limitations, an application could submit a new list of domains including include entries not previously listed. This could permit the application to resolve domain names that were previously restricted.
Heap Overflow in FreeBSD 12.4-RELEASE/13.2 libc __sflush before p7/p5
CVE-2023-5941
9.8 - Critical
- November 08, 2023
In versions of FreeBSD 12.4-RELEASE prior to 12.4-RELEASE-p7 and FreeBSD 13.2-RELEASE prior to 13.2-RELEASE-p5 the __sflush() stdio function in libc does not correctly update FILE objects' write space members for write-buffered streams when the write(2) system call returns an error. Depending on the nature of an application that calls libc's stdio functions and the presence of errors returned from the write(2) system call (or an overridden stdio write routine) a heap buffer overflow may occur. Such overflows may lead to data corruption or the execution of arbitrary code at the privilege level of the calling program.
Memory Corruption
Linux kernel copy_file_range CAP_SEEK privilege bypass
CVE-2023-5369
7.1 - High
- October 04, 2023
Before correction, the copy_file_range system call checked only for the CAP_READ and CAP_WRITE capabilities on the input and output file descriptors, respectively. Using an offset is logically equivalent to seeking, and the system call must additionally require the CAP_SEEK capability. This incorrect privilege check enabled sandboxed processes with only read or write but no seek capability on a file descriptor to read data from or write data to an arbitrary location within the file corresponding to that file descriptor.
Improper Check for Dropped Privileges
Linux kernel msdosfs Write-Back of Unallocated Disk Data on Truncate
CVE-2023-5368
6.5 - Medium
- October 04, 2023
On an msdosfs filesystem, the 'truncate' or 'ftruncate' system calls under certain circumstances populate the additional space in the file with unallocated data from the underlying disk device, rather than zero bytes. This may permit a user with write access to files on a msdosfs filesystem to read unintended data (e.g. from a previously deleted file).
Insecure Default Initialization of Resource
Linux Kernel SMCCC SpecExec Workaround Init Bug
CVE-2023-5370
5.5 - Medium
- October 04, 2023
On CPU 0 the check for the SMCCC workaround is called before SMCCC support has been initialized. This resulted in no speculative execution workarounds being installed on CPU 0.
Improper Initialization
pf Fragment Reassembly Bypass Enables Unintended Fragment Forwarding
CVE-2023-4809
7.5 - High
- September 06, 2023
In pf packet processing with a 'scrub fragment reassemble' rule, a packet containing multiple IPv6 fragment headers would be reassembled, and then immediately processed. That is, a packet with multiple fragment extension headers would not be recognized as the correct ultimate payload. Instead a packet with multiple IPv6 fragment headers would unexpectedly be interpreted as a fragmented packet, rather than as whatever the real payload is. As a result, IPv6 fragments may bypass pf firewall rules written on the assumption all fragments have been reassembled and, as a result, be forwarded or processed by the host.
Bhyve fwctl Driver Buffer Overflow Leads to Host Code Execution
CVE-2023-3494
8.8 - High
- August 01, 2023
The fwctl driver implements a state machine which is executed when a bhyve guest accesses certain x86 I/O ports. The interface lets the guest copy a string into a buffer resident in the bhyve process' memory. A bug in the state machine implementation can result in a buffer overflowing when copying this string. Malicious, privileged software running in a guest VM can exploit the buffer overflow to achieve code execution on the host in the bhyve userspace process, which typically runs as root, mitigated by the capabilities assigned through the Capsicum sandbox available to the bhyve process.
Classic Buffer Overflow
Linux Kernel IPv6 Fragmentation Integer Overflow Allowing DoS
CVE-2023-3107
7.5 - High
- August 01, 2023
A set of carefully crafted ipv6 packets can trigger an integer overflow in the calculation of a fragment reassembled packet's payload length field. This allows an attacker to trigger a kernel panic, resulting in a denial of service.
Integer Overflow or Wraparound
FreeBSD pam_krb5 Auth Bypass: Unvalidated TGT from KDC
CVE-2023-3326
9.8 - Critical
- June 22, 2023
pam_krb5 authenticates a user by essentially running kinit with the password, getting a ticket-granting ticket (tgt) from the Kerberos KDC (Key Distribution Center) over the network, as a way to verify the password. However, if a keytab is not provisioned on the system, pam_krb5 has no way to validate the response from the KDC, and essentially trusts the tgt provided over the network as being valid. In a non-default FreeBSD installation that leverages pam_krb5 for authentication and does not have a keytab provisioned, an attacker that is able to control both the password and the KDC responses can return a valid tgt, allowing authentication to occur for any user on the system.
authentification
GELI: Null Key Reuse via STDIN Key File Allows Master Key Recovery
CVE-2023-0751
6.5 - Medium
- February 08, 2023
When GELI reads a key file from standard input, it does not reuse the key file to initialize multiple providers at once resulting in the second and subsequent devices silently using a NULL key as the user key file. If a user only uses a key file without a user passphrase, the master key is encrypted with an empty key file allowing trivial recovery of the master key.