When dumping core and saving process information, proc_getargv() might return an sbuf which have a sbuf_len() of 0 or -1, which is not properly handled.

An out-of-bound read can happen when user constructs a specially crafted ps_string, which in turn can cause the kernel to crash.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 04 Jun 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Freebsd
Freebsd freebsd
CPEs cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.3:beta1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.3:p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.3:p2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.3:p3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.3:p4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.3:p5:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:beta1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:beta2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:beta3-p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:beta3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:beta4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:p10:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:p11:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:p2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:p3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:p4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:p5:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:p6:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:p7:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:p8:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:p9:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:rc1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:rc2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:rc3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:rc4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:rc5-p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:rc5:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.1:b1-p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.1:b2-p2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.1:rc1-p1:*:*:*:*:*:*
Vendors & Products Freebsd
Freebsd freebsd

Thu, 13 Mar 2025 22:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-125
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Thu, 13 Feb 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: freebsd

Published:

Updated: 2025-03-13T21:52:54.797Z

Reserved: 2022-01-10T22:07:46.041Z

Link: CVE-2022-23089

cve-icon Vulnrichment

Updated: 2024-08-03T03:28:43.522Z

cve-icon NVD

Status : Analyzed

Published: 2024-02-15T05:15:09.620

Modified: 2025-06-04T21:11:31.653

Link: CVE-2022-23089

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.