vulnerability
FreeBSD: VID-9BD5E47B-6B50-11EF-9A62-002590C1F29C (CVE-2024-43110): FreeBSD -- Multiple issues in ctl(4) CAM Target Layer
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:S/C:C/I:C/A:C) | Sep 4, 2024 | Sep 6, 2024 | Jan 28, 2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
Sep 4, 2024
Added
Sep 6, 2024
Modified
Jan 28, 2025
Description
The ctl_request_sense function could expose up to three bytes of the kernel heap to userspace.
Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process. A malicious iSCSI initiator could achieve remote code execution on the iSCSI target host.
Solution(s)
freebsd-upgrade-base-13_3-release-p6freebsd-upgrade-base-14_0-release-p10freebsd-upgrade-base-14_1-release-p4
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.