First published: Wed Nov 08 2023(Updated: )
In versions of FreeBSD 12.4-RELEASE prior to 12.4-RELEASE-p7 and FreeBSD 13.2-RELEASE prior to 13.2-RELEASE-p5 the __sflush() stdio function in libc does not correctly update FILE objects' write space members for write-buffered streams when the write(2) system call returns an error. Depending on the nature of an application that calls libc's stdio functions and the presence of errors returned from the write(2) system call (or an overridden stdio write routine) a heap buffer overflow may occur. Such overflows may lead to data corruption or the execution of arbitrary code at the privilege level of the calling program.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
<12.4 | ||
>=13.0<13.2 | ||
=12.4 | ||
=12.4-p1 | ||
=12.4-p2 | ||
=12.4-p3 | ||
=12.4-p4 | ||
=12.4-p5 | ||
=12.4-p6 | ||
=12.4-rc2-p1 | ||
=12.4-rc2-p2 | ||
=13.2 | ||
=13.2-p1 | ||
=13.2-p2 | ||
=13.2-p3 | ||
=13.2-p4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-5941 is a vulnerability in the libc library on FreeBSD systems.
CVE-2023-5941 has a severity score of 9.8, which is considered critical.
Versions of FreeBSD 12.4-RELEASE prior to 12.4-RELEASE-p7 and FreeBSD 13.2-RELEASE prior to 13.2-RELEASE-p5 are affected by CVE-2023-5941.
CVE-2023-5941 allows an attacker to cause a buffer overflow in the libc stdio function, potentially leading to arbitrary code execution or a denial of service.
You can find more information about CVE-2023-5941 in the FreeBSD Security Advisory FreeBSD-SA-23:15.stdio.asc.