Vulnerability Description
Handlers for *_CFG_PAGE read / write ioctls in the mpr, mps, and mpt drivers allocated a buffer of a caller-specified size, but copied to it a fixed size header. Other heap content would be overwritten if the specified size was too small. Users with access to the mpr, mps or mpt device node may overwrite heap data, potentially resulting in privilege escalation. Note that the device node is only accessible to root and members of the operator group.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freebsd | Freebsd | >= 12.0, < 12.3 |
Related Weaknesses (CWE)
References
- https://security.freebsd.org/advisories/FreeBSD-SA-22:06.ioctl.ascVendor Advisory
- https://security.netapp.com/advisory/ntap-20240419-0002/Third Party Advisory
- https://security.freebsd.org/advisories/FreeBSD-SA-22:06.ioctl.ascVendor Advisory
- https://security.netapp.com/advisory/ntap-20240419-0002/Third Party Advisory
FAQ
What is CVE-2022-23086?
CVE-2022-23086 is a vulnerability with a CVSS score of 7.8 (HIGH). Handlers for *_CFG_PAGE read / write ioctls in the mpr, mps, and mpt drivers allocated a buffer of a caller-specified size, but copied to it a fixed size header. Other heap content would be overwritt...
How severe is CVE-2022-23086?
CVE-2022-23086 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-23086?
Check the references section above for vendor advisories and patch information. Affected products include: Freebsd Freebsd.