CVE-2022-23092

The implementation of lib9p's handling of RWALK messages was missing a bounds check needed when unpacking the message contents.  The missing check means that the receipt of a specially crafted message will cause lib9p to overwrite unrelated memory.

The bug can be triggered by a malicious bhyve guest kernel to overwrite memory in the bhyve(8) process.  This could potentially lead to user-mode code execution on the host, subject to bhyve's Capsicum sandbox.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.8 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
freebsdCNA
---
---
CVEADP
---
---
CISA-ADPADP
8.8 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 53%
VendorProductVersion
freebsdfreebsd
13.0:beta1
freebsdfreebsd
13.0:beta2
freebsdfreebsd
13.0:beta3
freebsdfreebsd
13.0:beta3-p1
freebsdfreebsd
13.0:beta4
freebsdfreebsd
13.0:p1
freebsdfreebsd
13.0:p10
freebsdfreebsd
13.0:p11
freebsdfreebsd
13.0:p2
freebsdfreebsd
13.0:p3
freebsdfreebsd
13.0:p4
freebsdfreebsd
13.0:p5
freebsdfreebsd
13.0:p6
freebsdfreebsd
13.0:p7
freebsdfreebsd
13.0:p8
freebsdfreebsd
13.0:p9
freebsdfreebsd
13.0:rc1
freebsdfreebsd
13.0:rc2
freebsdfreebsd
13.0:rc3
freebsdfreebsd
13.0:rc4
freebsdfreebsd
13.0:rc5
freebsdfreebsd
13.0:rc5-p1
freebsdfreebsd
13.1:b1-p1
freebsdfreebsd
13.1:b2-p2
freebsdfreebsd
13.1:rc1-p1
𝑥
= Vulnerable software versions