In FreeBSD 12.1-STABLE before r357490, 12.1-RELEASE before 12.1-RELEASE-p3, 11.3-STABLE before r357489, and 11.3-RELEASE before 11.3-RELEASE-p7, incorrect use of a user-controlled pointer in the epair virtual network module allowed vnet jailed privileged users to panic the host system and potentially execute arbitrary code in the kernel.
                
            References
                    | Link | Resource | 
|---|---|
| https://security.FreeBSD.org/advisories/FreeBSD-SA-20:07.epair.asc | Patch Vendor Advisory | 
| https://security.FreeBSD.org/advisories/FreeBSD-SA-20:07.epair.asc | Patch Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    21 Nov 2024, 05:37
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://security.FreeBSD.org/advisories/FreeBSD-SA-20:07.epair.ascĀ - Patch, Vendor Advisory | 
Information
                Published : 2020-04-29 00:15
Updated : 2024-11-21 05:37
NVD link : CVE-2020-7452
Mitre link : CVE-2020-7452
CVE.ORG link : CVE-2020-7452
JSON object : View
Products Affected
                freebsd
- freebsd
 
CWE
                
                    
                        
                        CWE-119
                        
            Improper Restriction of Operations within the Bounds of a Memory Buffer
