CVE-2023-5941

In versions of FreeBSD 12.4-RELEASE prior to 12.4-RELEASE-p7 and FreeBSD 13.2-RELEASE prior to 13.2-RELEASE-p5 the __sflush() stdio function in libc does not correctly update FILE objects' write space members for write-buffered streams when the write(2) system call returns an error.  Depending on the nature of an application that calls libc's stdio functions and the presence of errors returned from the write(2) system call (or an overridden stdio write routine) a heap buffer overflow may occur. Such overflows may lead to data corruption or the execution of arbitrary code at the privilege level of the calling program.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.4:-:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.4:p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.4:p2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.4:p3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.4:p4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.4:p5:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.4:p6:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.4:rc2-p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.4:rc2-p2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.2:-:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.2:p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.2:p2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.2:p3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.2:p4:*:*:*:*:*:*

History

14 Dec 2023, 10:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20231214-0004/ -

16 Nov 2023, 15:37

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Freebsd
Freebsd freebsd
CPE cpe:2.3:o:freebsd:freebsd:12.4:p3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.2:p3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.2:p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.2:-:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.4:p2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.4:rc2-p2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.4:p5:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.2:p4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.4:p4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.4:-:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.4:rc2-p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.2:p2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.4:p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.4:p6:*:*:*:*:*:*
References () https://security.freebsd.org/advisories/FreeBSD-SA-23:15.stdio.asc - () https://security.freebsd.org/advisories/FreeBSD-SA-23:15.stdio.asc - Vendor Advisory
CWE CWE-131
CWE-787

08 Nov 2023, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-08 09:15

Updated : 2024-02-28 20:54


NVD link : CVE-2023-5941

Mitre link : CVE-2023-5941

CVE.ORG link : CVE-2023-5941


JSON object : View

Products Affected

freebsd

  • freebsd
CWE
CWE-131

Incorrect Calculation of Buffer Size

CWE-787

Out-of-bounds Write