In FreeBSD 12.1-STABLE before r357490, 12.1-RELEASE before 12.1-RELEASE-p3, 11.3-STABLE before r357489, and 11.3-RELEASE before 11.3-RELEASE-p7, incorrect use of a user-controlled pointer in the epair virtual network module allowed vnet jailed privileged users to panic the host system and potentially execute arbitrary code in the kernel.
References
Link | Resource |
---|---|
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:07.epair.asc | Patch Vendor Advisory |
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:07.epair.asc | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:37
Type | Values Removed | Values Added |
---|---|---|
References | () https://security.FreeBSD.org/advisories/FreeBSD-SA-20:07.epair.ascĀ - Patch, Vendor Advisory |
Information
Published : 2020-04-29 00:15
Updated : 2024-11-21 05:37
NVD link : CVE-2020-7452
Mitre link : CVE-2020-7452
CVE.ORG link : CVE-2020-7452
JSON object : View
Products Affected
freebsd
- freebsd
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer