CVE-2022-23089

When dumping core and saving process information, proc_getargv() might return an sbuf which have a sbuf_len() of 0 or -1, which is not properly handled.

An out-of-bound read can happen when user constructs a specially crafted ps_string, which in turn can cause the kernel to crash.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.7 MEDIUM
LOCAL
HIGH
LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
freebsdCNA
---
---
CISA-ADPADP
4.7 MEDIUM
LOCAL
HIGH
LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 16%
VendorProductVersion
freebsdfreebsd
𝑥
< 12.3
freebsdfreebsd
12.4 ≤
𝑥
< 13.0
freebsdfreebsd
12.3:beta1
freebsdfreebsd
12.3:p1
freebsdfreebsd
12.3:p2
freebsdfreebsd
12.3:p3
freebsdfreebsd
12.3:p4
freebsdfreebsd
12.3:p5
freebsdfreebsd
13.0:beta1
freebsdfreebsd
13.0:beta2
freebsdfreebsd
13.0:beta3
freebsdfreebsd
13.0:beta3-p1
freebsdfreebsd
13.0:beta4
freebsdfreebsd
13.0:p1
freebsdfreebsd
13.0:p10
freebsdfreebsd
13.0:p11
freebsdfreebsd
13.0:p2
freebsdfreebsd
13.0:p3
freebsdfreebsd
13.0:p4
freebsdfreebsd
13.0:p5
freebsdfreebsd
13.0:p6
freebsdfreebsd
13.0:p7
freebsdfreebsd
13.0:p8
freebsdfreebsd
13.0:p9
freebsdfreebsd
13.0:rc1
freebsdfreebsd
13.0:rc2
freebsdfreebsd
13.0:rc3
freebsdfreebsd
13.0:rc4
freebsdfreebsd
13.0:rc5
freebsdfreebsd
13.0:rc5-p1
freebsdfreebsd
13.1:b1-p1
freebsdfreebsd
13.1:b2-p2
freebsdfreebsd
13.1:rc1-p1
𝑥
= Vulnerable software versions