CVE-2022-23089
15.02.2024, 05:15
When dumping core and saving process information, proc_getargv() might return an sbuf which have a sbuf_len() of 0 or -1, which is not properly handled. An out-of-bound read can happen when user constructs a specially crafted ps_string, which in turn can cause the kernel to crash.Enginsight
Vendor | Product | Version |
---|---|---|
freebsd | freebsd | 𝑥 < 12.3 |
freebsd | freebsd | 12.4 ≤ 𝑥 < 13.0 |
freebsd | freebsd | 12.3:beta1 |
freebsd | freebsd | 12.3:p1 |
freebsd | freebsd | 12.3:p2 |
freebsd | freebsd | 12.3:p3 |
freebsd | freebsd | 12.3:p4 |
freebsd | freebsd | 12.3:p5 |
freebsd | freebsd | 13.0:beta1 |
freebsd | freebsd | 13.0:beta2 |
freebsd | freebsd | 13.0:beta3 |
freebsd | freebsd | 13.0:beta3-p1 |
freebsd | freebsd | 13.0:beta4 |
freebsd | freebsd | 13.0:p1 |
freebsd | freebsd | 13.0:p10 |
freebsd | freebsd | 13.0:p11 |
freebsd | freebsd | 13.0:p2 |
freebsd | freebsd | 13.0:p3 |
freebsd | freebsd | 13.0:p4 |
freebsd | freebsd | 13.0:p5 |
freebsd | freebsd | 13.0:p6 |
freebsd | freebsd | 13.0:p7 |
freebsd | freebsd | 13.0:p8 |
freebsd | freebsd | 13.0:p9 |
freebsd | freebsd | 13.0:rc1 |
freebsd | freebsd | 13.0:rc2 |
freebsd | freebsd | 13.0:rc3 |
freebsd | freebsd | 13.0:rc4 |
freebsd | freebsd | 13.0:rc5 |
freebsd | freebsd | 13.0:rc5-p1 |
freebsd | freebsd | 13.1:b1-p1 |
freebsd | freebsd | 13.1:b2-p2 |
freebsd | freebsd | 13.1:rc1-p1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration