CVE number = CVE-2022-23088
This vulnerability in FreeBSD allows network-adjacent attackers to execute arbitrary code on affected installations of FreeBSD Kernel.
Authentication is not required to exploit this vulnerability.
The specific flaw exists within the handling of 802.11 Wi-Fi beacon frames. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the kernel.
No workaround is available. Systems not using Wi-Fi are not affected.
FreeBSD has issued an update to correct this vulnerability.
More details can be found at:
I am one of the editors here at www.systemtek.co.uk I am a UK based technology professional, with an interest in computer security and telecoms.