First published: Thu Sep 05 2024(Updated: )
A malicious value of size in a structure of packed libnv can cause an integer overflow, leading to the allocation of a smaller buffer than required for the parsed data.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD FreeBSD | >=13.0<13.3 | |
FreeBSD FreeBSD | =13.3 | |
FreeBSD FreeBSD | =13.3-p1 | |
FreeBSD FreeBSD | =13.3-p2 | |
FreeBSD FreeBSD | =13.3-p3 | |
FreeBSD FreeBSD | =13.3-p4 | |
FreeBSD FreeBSD | =13.3-p5 | |
FreeBSD FreeBSD | =13.4-beta3 | |
FreeBSD FreeBSD | =14.0 | |
FreeBSD FreeBSD | =14.0-beta5 | |
FreeBSD FreeBSD | =14.0-p1 | |
FreeBSD FreeBSD | =14.0-p2 | |
FreeBSD FreeBSD | =14.0-p3 | |
FreeBSD FreeBSD | =14.0-p4 | |
FreeBSD FreeBSD | =14.0-p5 | |
FreeBSD FreeBSD | =14.0-p6 | |
FreeBSD FreeBSD | =14.0-p7 | |
FreeBSD FreeBSD | =14.0-p8 | |
FreeBSD FreeBSD | =14.0-p9 | |
FreeBSD FreeBSD | =14.0-rc3 | |
FreeBSD FreeBSD | =14.0-rc4-p1 | |
FreeBSD FreeBSD | =14.1 | |
FreeBSD FreeBSD | =14.1-p1 | |
FreeBSD FreeBSD | =14.1-p2 | |
FreeBSD FreeBSD | =14.1-p3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.