In FreeBSD 12.1-STABLE before r363918, 12.1-RELEASE before p8, 11.4-STABLE before r363919, 11.4-RELEASE before p2, and 11.3-RELEASE before p12, the sendmsg system call in the compat32 subsystem on 64-bit platforms has a time-of-check to time-of-use vulnerability allowing a mailcious userspace program to modify control message headers after they were validation.
The product checks the state of a resource before using that resource, but the resource's state can change between the check and the use in a way that invalidates the results of the check. This can cause the product to perform invalid actions when the resource is in an unexpected state.
Link | Tags |
---|---|
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:23.sendmsg.asc | vendor advisory |
https://www.zerodayinitiative.com/advisories/ZDI-20-949/ | third party advisory vdb entry |
https://security.netapp.com/advisory/ntap-20200821-0005/ | third party advisory |