The implementation of lib9p's handling of RWALK messages was missing a bounds check needed when unpacking the message contents. The missing check means that the receipt of a specially crafted message will cause lib9p to overwrite unrelated memory.

The bug can be triggered by a malicious bhyve guest kernel to overwrite memory in the bhyve(8) process. This could potentially lead to user-mode code execution on the host, subject to bhyve's Capsicum sandbox.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 04 Jun 2025 22:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:freebsd:freebsd:13.0:beta1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:beta2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:beta3-p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:beta3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:beta4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:p10:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:p11:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:p2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:p3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:p4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:p5:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:p6:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:p7:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:p8:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:p9:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:rc1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:rc2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:rc3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:rc4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:rc5-p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:rc5:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.1:b1-p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.1:b2-p2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.1:rc1-p1:*:*:*:*:*:*

Thu, 13 Feb 2025 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Freebsd
Freebsd freebsd
CPEs cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
Vendors & Products Freebsd
Freebsd freebsd
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 29 Aug 2024 21:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-787
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: freebsd

Published:

Updated: 2025-02-13T16:29:03.221Z

Reserved: 2022-01-10T22:07:46.042Z

Link: CVE-2022-23092

cve-icon Vulnrichment

Updated: 2024-08-03T03:28:43.506Z

cve-icon NVD

Status : Analyzed

Published: 2024-02-15T06:15:45.190

Modified: 2025-06-04T22:09:43.293

Link: CVE-2022-23092

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.