Описание
A user-provided integer option was passed to nmreq_copyin() without checking if it would overflow. This insufficient bounds checking could lead to kernel memory corruption.
On systems configured to include netmap in their devfs_ruleset, a privileged process running in a jail can affect the host environment.
Ссылки
- Vendor Advisory
- Third Party Advisory
- Vendor Advisory
- Third Party Advisory
Уязвимые конфигурации
Одно из
EPSS
8.2 High
CVSS3
9.8 Critical
CVSS3
Дефекты
Связанные уязвимости
A user-provided integer option was passed to nmreq_copyin() without checking if it would overflow. This insufficient bounds checking could lead to kernel memory corruption. On systems configured to include netmap in their devfs_ruleset, a privileged process running in a jail can affect the host environment.
Уязвимость функции nmreq_copyin() компонента netmap операционных систем FreeBSD, позволяющая нарушителю выполнить произвольный код в контексте ядра
EPSS
8.2 High
CVSS3
9.8 Critical
CVSS3