A user-provided integer option was passed to nmreq_copyin...
Critical severity
Unreviewed
Published
Feb 15, 2024
to the GitHub Advisory Database
•
Updated Aug 1, 2024
Description
Published by the National Vulnerability Database
Feb 15, 2024
Published to the GitHub Advisory Database
Feb 15, 2024
Last updated
Aug 1, 2024
A user-provided integer option was passed to nmreq_copyin() without checking if it would overflow. This insufficient bounds checking could lead to kernel memory corruption.
On systems configured to include netmap in their devfs_ruleset, a privileged process running in a jail can affect the host environment.
References