In FreeBSD 12.1-STABLE before r363918, 12.1-RELEASE before p8, 11.4-STABLE before r363919, 11.4-RELEASE before p2, and 11.3-RELEASE before p12, the sendmsg system call in the compat32 subsystem on 64-bit platforms has a time-of-check to time-of-use vulnerability allowing a mailcious userspace program to modify control message headers after they were validation.
References
Link | Resource |
---|---|
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:23.sendmsg.asc | Vendor Advisory |
https://security.netapp.com/advisory/ntap-20200821-0005/ | Third Party Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-20-949/ | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
01 Jul 2022, 18:44
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) https://security.netapp.com/advisory/ntap-20200821-0005/ - Third Party Advisory |
Information
Published : 2020-08-06 17:15
Updated : 2024-02-04 21:00
NVD link : CVE-2020-7460
Mitre link : CVE-2020-7460
CVE.ORG link : CVE-2020-7460
JSON object : View
Products Affected
freebsd
- freebsd
CWE
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition