CVE Vulnerabilities

CVE-2020-7462

Use After Free

Published: Mar 26, 2021 | Modified: Nov 21, 2024
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
4.9 MEDIUM
AV:L/AC:L/Au:N/C:N/I:N/A:C
RedHat/V2
RedHat/V3
Ubuntu

In 11.4-PRERELEASE before r360733 and 11.3-RELEASE before p13, improper mbuf handling in the kernel causes a use-after-free bug by sending IPv6 Hop-by-Hop options over the loopback interface. The use-after-free situation may result in unintended kernel behaviour including a kernel panic.

Weakness

The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory “belongs” to the code that operates on the new pointer.

Affected Software

Name Vendor Start Version End Version
Freebsd Freebsd 11.3 (including) 11.3 (including)
Freebsd Freebsd 11.3-p1 (including) 11.3-p1 (including)
Freebsd Freebsd 11.3-p10 (including) 11.3-p10 (including)
Freebsd Freebsd 11.3-p11 (including) 11.3-p11 (including)
Freebsd Freebsd 11.3-p12 (including) 11.3-p12 (including)
Freebsd Freebsd 11.3-p2 (including) 11.3-p2 (including)
Freebsd Freebsd 11.3-p3 (including) 11.3-p3 (including)
Freebsd Freebsd 11.3-p4 (including) 11.3-p4 (including)
Freebsd Freebsd 11.3-p5 (including) 11.3-p5 (including)
Freebsd Freebsd 11.3-p6 (including) 11.3-p6 (including)
Freebsd Freebsd 11.3-p7 (including) 11.3-p7 (including)
Freebsd Freebsd 11.3-p8 (including) 11.3-p8 (including)
Freebsd Freebsd 11.3-p9 (including) 11.3-p9 (including)
Freebsd Freebsd 11.4 (including) 11.4 (including)

Potential Mitigations

References