First published: Wed Nov 08 2023(Updated: )
In versions of FreeBSD 13-RELEASE before 13-RELEASE-p5, under certain circumstances the cap_net libcasper(3) service incorrectly validates that updated constraints are strictly subsets of the active constraints. When only a list of resolvable domain names was specified without setting any other limitations, an application could submit a new list of domains including include entries not previously listed. This could permit the application to resolve domain names that were previously restricted.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD FreeBSD | >=13.0<13.2 | |
FreeBSD FreeBSD | =13.2 | |
FreeBSD FreeBSD | =13.2-p1 | |
FreeBSD FreeBSD | =13.2-p2 | |
FreeBSD FreeBSD | =13.2-p3 | |
FreeBSD FreeBSD | =13.2-p4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-5978 is high.
CVE-2023-5978 affects versions of FreeBSD 13-RELEASE before 13-RELEASE-p5.
The impact of CVE-2023-5978 is that under certain circumstances, the cap_net libcasper(3) service incorrectly validates updated constraints.
To fix CVE-2023-5978, update to FreeBSD version 13-RELEASE-p5 or later.
More information about CVE-2023-5978 can be found at https://security.freebsd.org/advisories/FreeBSD-SA-23:16.cap_net.asc.