In FreeBSD 12.1-STABLE before r363918, 12.1-RELEASE before p8, 11.4-STABLE before r363919, 11.4-RELEASE before p2, and 11.3-RELEASE before p12, the sendmsg system call in the compat32 subsystem on 64-bit platforms has a time-of-check to time-of-use vulnerability allowing a mailcious userspace program to modify control message headers after they were validation.
References
Link | Resource |
---|---|
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:23.sendmsg.asc | Vendor Advisory |
https://security.netapp.com/advisory/ntap-20200821-0005/ | Third Party Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-20-949/ | Third Party Advisory VDB Entry |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: freebsd
Published: 2020-08-06T16:49:16
Updated: 2020-08-21T09:06:13
Reserved: 2020-01-21T00:00:00
Link: CVE-2020-7460
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-08-06T17:15:11.317
Modified: 2022-07-01T18:44:30.037
Link: CVE-2020-7460
JSON object: View
Redhat Information
No data.
CWE