Description
In FreeBSD 12.1-STABLE before r363918, 12.1-RELEASE before p8, 11.4-STABLE before r363919, 11.4-RELEASE before p2, and 11.3-RELEASE before p12, the sendmsg system call in the compat32 subsystem on 64-bit platforms has a time-of-check to time-of-use vulnerability allowing a mailcious userspace program to modify control message headers after they were validation.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-28586 | In FreeBSD 12.1-STABLE before r363918, 12.1-RELEASE before p8, 11.4-STABLE before r363919, 11.4-RELEASE before p2, and 11.3-RELEASE before p12, the sendmsg system call in the compat32 subsystem on 64-bit platforms has a time-of-check to time-of-use vulnerability allowing a mailcious userspace program to modify control message headers after they were validation. |
References
History
No history.
Status: PUBLISHED
Assigner: freebsd
Published:
Updated: 2024-08-04T09:25:49.126Z
Reserved: 2020-01-21T00:00:00.000Z
Link: CVE-2020-7460
No data.
Status : Modified
Published: 2020-08-06T17:15:11.317
Modified: 2024-11-21T05:37:11.337
Link: CVE-2020-7460
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD