The implementation of lib9p's handling of RWALK messages was missing a bounds check needed when unpacking the message contents. The missing check means that the receipt of a specially crafted message will cause lib9p to overwrite unrelated memory.
The bug can be triggered by a malicious bhyve guest kernel to overwrite memory in the bhyve(8) process. This could potentially lead to user-mode code execution on the host, subject to bhyve's Capsicum sandbox.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Freebsd
Freebsd freebsd |
|
CPEs | cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:* | |
Vendors & Products |
Freebsd
Freebsd freebsd |
|
Metrics |
ssvc
|
Thu, 29 Aug 2024 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-787 | |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: freebsd
Published:
Updated: 2025-02-13T16:29:03.221Z
Reserved: 2022-01-10T22:07:46.042Z
Link: CVE-2022-23092

Updated: 2024-08-03T03:28:43.506Z

Status : Awaiting Analysis
Published: 2024-02-15T06:15:45.190
Modified: 2024-11-21T06:47:58.153
Link: CVE-2022-23092

No data.