CVE-2022-23092
15.02.2024, 06:15
The implementation of lib9p's handling of RWALK messages was missing a bounds check needed when unpacking the message contents. The missing check means that the receipt of a specially crafted message will cause lib9p to overwrite unrelated memory. The bug can be triggered by a malicious bhyve guest kernel to overwrite memory in the bhyve(8) process. This could potentially lead to user-mode code execution on the host, subject to bhyve's Capsicum sandbox.Enginsight
Vendor | Product | Version |
---|---|---|
freebsd | freebsd | 13.0:beta1 |
freebsd | freebsd | 13.0:beta2 |
freebsd | freebsd | 13.0:beta3 |
freebsd | freebsd | 13.0:beta3-p1 |
freebsd | freebsd | 13.0:beta4 |
freebsd | freebsd | 13.0:p1 |
freebsd | freebsd | 13.0:p10 |
freebsd | freebsd | 13.0:p11 |
freebsd | freebsd | 13.0:p2 |
freebsd | freebsd | 13.0:p3 |
freebsd | freebsd | 13.0:p4 |
freebsd | freebsd | 13.0:p5 |
freebsd | freebsd | 13.0:p6 |
freebsd | freebsd | 13.0:p7 |
freebsd | freebsd | 13.0:p8 |
freebsd | freebsd | 13.0:p9 |
freebsd | freebsd | 13.0:rc1 |
freebsd | freebsd | 13.0:rc2 |
freebsd | freebsd | 13.0:rc3 |
freebsd | freebsd | 13.0:rc4 |
freebsd | freebsd | 13.0:rc5 |
freebsd | freebsd | 13.0:rc5-p1 |
freebsd | freebsd | 13.1:b1-p1 |
freebsd | freebsd | 13.1:b2-p2 |
freebsd | freebsd | 13.1:rc1-p1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration