The implementation of lib9p's handling of RWALK messages was missing a bounds check needed when unpacking the message contents.  The missing check means that the receipt of a specially crafted message will cause lib9p to overwrite unrelated memory.
The bug can be triggered by a malicious bhyve guest kernel to overwrite memory in the bhyve(8) process. This could potentially lead to user-mode code execution on the host, subject to bhyve's Capsicum sandbox.
            The bug can be triggered by a malicious bhyve guest kernel to overwrite memory in the bhyve(8) process. This could potentially lead to user-mode code execution on the host, subject to bhyve's Capsicum sandbox.
Metrics
Affected Vendors & Products
Advisories
    | Source | ID | Title | 
|---|---|---|
|  EUVD | EUVD-2022-28197 | The implementation of lib9p's handling of RWALK messages was missing a bounds check needed when unpacking the message contents. The missing check means that the receipt of a specially crafted message will cause lib9p to overwrite unrelated memory. The bug can be triggered by a malicious bhyve guest kernel to overwrite memory in the bhyve(8) process. This could potentially lead to user-mode code execution on the host, subject to bhyve's Capsicum sandbox. | 
Fixes
    Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
        History
                    Wed, 04 Jun 2025 22:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:2.3:o:freebsd:freebsd:13.0:beta1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:beta2:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:beta3-p1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:beta3:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:beta4:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:p10:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:p11:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:p1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:p2:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:p3:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:p4:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:p5:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:p6:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:p7:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:p8:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:p9:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:rc1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:rc2:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:rc3:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:rc4:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:rc5-p1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:rc5:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.1:b1-p1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.1:b2-p2:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.1:rc1-p1:*:*:*:*:*:* | 
Thu, 13 Feb 2025 17:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Freebsd Freebsd freebsd | |
| CPEs | cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:* | |
| Vendors & Products | Freebsd Freebsd freebsd | |
| Metrics | ssvc 
 | 
Thu, 29 Aug 2024 21:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Weaknesses | CWE-787 | |
| Metrics | cvssV3_1 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: freebsd
Published:
Updated: 2025-02-13T16:29:03.221Z
Reserved: 2022-01-10T22:07:46.042Z
Link: CVE-2022-23092
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-03T03:28:43.506Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2024-02-15T06:15:45.190
Modified: 2025-06-04T22:09:43.293
Link: CVE-2022-23092
 Redhat
                        Redhat
                    No data.
 OpenCVE Enrichment
                        OpenCVE Enrichment
                    No data.