FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

FreeBSD -- Incorrect user-controlled pointer use in epair

Affected packages
12.1 <= FreeBSD-kernel < 12.1_3
11.3 <= FreeBSD-kernel < 11.3_7

Details

VuXML ID 0cc7e547-6a0a-11ea-92ab-00163e433440
Discovery 2020-03-19
Entry 2020-03-19

Problem Description:

Incorrect use of a potentially user-controlled pointer in the kernel allowed vnet jailed users to panic the system and potentially execute aribitrary code in the kernel.

Impact:

Users with root level access (or the PRIV_NET_IFCREATE privilege) can panic the system, or potentially escape the jail or execute arbitrary code with kernel priviliges.

References

CVE Name CVE-2020-7452
FreeBSD Advisory SA-20:07.epair