In FreeBSD 12.1-STABLE before r359021, 12.1-RELEASE before 12.1-RELEASE-p3, 11.3-STABLE before r359020, and 11.3-RELEASE before 11.3-RELEASE-p7, a missing null termination check in the jail_set configuration option "osrelease" may return more bytes with a subsequent jail_get system call allowing a malicious jail superuser with permission to create nested jails to read kernel memory.
References
Link | Resource |
---|---|
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:08.jail.asc | Patch Vendor Advisory |
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:08.jail.asc | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:37
Type | Values Removed | Values Added |
---|---|---|
References | () https://security.FreeBSD.org/advisories/FreeBSD-SA-20:08.jail.ascĀ - Patch, Vendor Advisory |
Information
Published : 2020-04-29 00:15
Updated : 2024-11-21 05:37
NVD link : CVE-2020-7453
Mitre link : CVE-2020-7453
CVE.ORG link : CVE-2020-7453
JSON object : View
Products Affected
freebsd
- freebsd
CWE
CWE-754
Improper Check for Unusual or Exceptional Conditions