First published: Thu Sep 05 2024(Updated: )
A malicious value of size in a structure of packed libnv can cause an integer overflow, leading to the allocation of a smaller buffer than required for the parsed data.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | >=13.0<13.3 | |
FreeBSD Kernel | =13.3 | |
FreeBSD Kernel | =13.3-p1 | |
FreeBSD Kernel | =13.3-p2 | |
FreeBSD Kernel | =13.3-p3 | |
FreeBSD Kernel | =13.3-p4 | |
FreeBSD Kernel | =13.3-p5 | |
FreeBSD Kernel | =13.4-beta3 | |
FreeBSD Kernel | =14.0 | |
FreeBSD Kernel | =14.0-beta5 | |
FreeBSD Kernel | =14.0-p1 | |
FreeBSD Kernel | =14.0-p2 | |
FreeBSD Kernel | =14.0-p3 | |
FreeBSD Kernel | =14.0-p4 | |
FreeBSD Kernel | =14.0-p5 | |
FreeBSD Kernel | =14.0-p6 | |
FreeBSD Kernel | =14.0-p7 | |
FreeBSD Kernel | =14.0-p8 | |
FreeBSD Kernel | =14.0-p9 | |
FreeBSD Kernel | =14.0-rc3 | |
FreeBSD Kernel | =14.0-rc4-p1 | |
FreeBSD Kernel | =14.1 | |
FreeBSD Kernel | =14.1-p1 | |
FreeBSD Kernel | =14.1-p2 | |
FreeBSD Kernel | =14.1-p3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-45287 is classified as critical due to the potential for integer overflow and buffer allocation issues.
To fix CVE-2024-45287, update to the patched versions of FreeBSD provided in the security advisory.
CVE-2024-45287 affects FreeBSD versions from 13.0 up to and including 13.3, and versions from 14.0 up to 14.1.
CVE-2024-45287 can potentially lead to memory corruption, denial of service, or arbitrary code execution due to improper buffer sizing.
As of now, there are no publicly disclosed exploits for CVE-2024-45287, but it remains a significant risk until patched.