In FreeBSD 12.1-STABLE before r363918, 12.1-RELEASE before p8, 11.4-STABLE before r363919, 11.4-RELEASE before p2, and 11.3-RELEASE before p12, the sendmsg system call in the compat32 subsystem on 64-bit platforms has a time-of-check to time-of-use vulnerability allowing a mailcious userspace program to modify control message headers after they were validation.
References
Link | Resource |
---|---|
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:23.sendmsg.asc | Vendor Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-20-949/ | Third Party Advisory VDB Entry |
https://security.netapp.com/advisory/ntap-20200821-0005/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-08-06 10:15
Updated : 2022-07-01 11:44
NVD link : CVE-2020-7460
Mitre link : CVE-2020-7460
JSON object : View
CWE
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
Products Affected
freebsd
- freebsd