First published: Thu Feb 15 2024(Updated: )
The total size of the user-provided nmreq to nmreq_copyin() was first computed and then trusted during the copyin. This time-of-check to time-of-use bug could lead to kernel memory corruption. On systems configured to include netmap in their devfs_ruleset, a privileged process running in a jail can affect the host environment.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | >=12.0<12.3 | |
FreeBSD Kernel | =12.3 | |
FreeBSD Kernel | =12.3-p1 | |
FreeBSD Kernel | =12.3-p2 | |
FreeBSD Kernel | =12.3-p3 | |
FreeBSD Kernel | =12.3-p4 | |
FreeBSD Kernel | =13.0 | |
FreeBSD Kernel | =13.0-beta1 | |
FreeBSD Kernel | =13.0-beta2 | |
FreeBSD Kernel | =13.0-beta3 | |
FreeBSD Kernel | =13.0-beta3-p1 | |
FreeBSD Kernel | =13.0-beta4 | |
FreeBSD Kernel | =13.0-p1 | |
FreeBSD Kernel | =13.0-p10 | |
FreeBSD Kernel | =13.0-p2 | |
FreeBSD Kernel | =13.0-p3 | |
FreeBSD Kernel | =13.0-p4 | |
FreeBSD Kernel | =13.0-p5 | |
FreeBSD Kernel | =13.0-p6 | |
FreeBSD Kernel | =13.0-p7 | |
FreeBSD Kernel | =13.0-p8 | |
FreeBSD Kernel | =13.0-p9 | |
FreeBSD Kernel | =13.0-rc1 | |
FreeBSD Kernel | =13.0-rc2 | |
FreeBSD Kernel | =13.0-rc3 | |
FreeBSD Kernel | =13.0-rc4 | |
FreeBSD Kernel | =13.0-rc5 | |
FreeBSD Kernel | =13.0-rc5-p1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23084 is classified as a high-severity vulnerability due to its potential to lead to kernel memory corruption.
To address CVE-2022-23084, users should update to the latest patched version of FreeBSD that resolves this vulnerability.
CVE-2022-23084 affects FreeBSD versions 12.0 through 12.3 and versions from 13.0 to 13.0-rc5.
CVE-2022-23084 can be exploited by a privileged process to potentially corrupt kernel memory, leading to system instability.
You can check the version of FreeBSD running on your system to determine if it falls within the affected version range for CVE-2022-23084.