The function ctl_write_buffer incorrectly set a flag which resulted in a kernel Use-After-Free when a command finished processing. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process. A malicious iSCSI initiator could achieve remote code execution on the iSCSI target host.
2024-09-05T05:15:13.830
2024-09-06T17:35:18.370
Modified
CVSSv3.1: 8.8 (HIGH)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | freebsd | freebsd | < 13.3 | Yes |
Operating System | freebsd | freebsd | 13.3 | Yes |
Operating System | freebsd | freebsd | 13.3 | Yes |
Operating System | freebsd | freebsd | 13.3 | Yes |
Operating System | freebsd | freebsd | 13.3 | Yes |
Operating System | freebsd | freebsd | 13.3 | Yes |
Operating System | freebsd | freebsd | 13.3 | Yes |
Operating System | freebsd | freebsd | 13.4 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.1 | Yes |
Operating System | freebsd | freebsd | 14.1 | Yes |
Operating System | freebsd | freebsd | 14.1 | Yes |
Operating System | freebsd | freebsd | 14.1 | Yes |