The implementation of lib9p's handling of RWALK messages was missing a bounds check needed when unpacking the message contents. The missing check means that the receipt of a specially crafted message will cause lib9p to overwrite unrelated memory. The bug can be triggered by a malicious bhyve guest kernel to overwrite memory in the bhyve(8) process. This could potentially lead to user-mode code execution on the host, subject to bhyve's Capsicum sandbox.
History

Thu, 13 Feb 2025 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Freebsd
Freebsd freebsd
CPEs cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
Vendors & Products Freebsd
Freebsd freebsd
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 29 Aug 2024 21:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-787
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: freebsd

Published:

Updated: 2025-02-13T16:29:03.221Z

Reserved: 2022-01-10T22:07:46.042Z

Link: CVE-2022-23092

cve-icon Vulnrichment

Updated: 2024-08-03T03:28:43.506Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-02-15T06:15:45.190

Modified: 2024-11-21T06:47:58.153

Link: CVE-2022-23092

cve-icon Redhat

No data.