First published: Thu Sep 03 2020(Updated: )
In MidnightBSD before 1.2.6 and 1.3 before August 2020, and FreeBSD before 7, a NULL pointer dereference was found in the Linux emulation layer that allows attackers to crash the running kernel. During binary interaction, td->td_emuldata in sys/compat/linux/linux_emul.h is not getting initialized and returns NULL from em_find().
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Midnightbsd Midnightbsd | <1.2.6 | |
Midnightbsd Midnightbsd | >=1.3<=2020-08-19 | |
FreeBSD FreeBSD | <=7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-24385 is a vulnerability found in MidnightBSD and FreeBSD that allows attackers to crash the running kernel through a NULL pointer dereference in the Linux emulation layer.
CVE-2020-24385 can crash the running kernel in MidnightBSD versions before 1.2.6 and 1.3 before August 2020, as well as FreeBSD versions before 7.
CVE-2020-24385 has a severity rating of medium, with a CVSS score of 5.5.
You can find more information about CVE-2020-24385 in the security advisory published by MidnightBSD at http://www.midnightbsd.org/security/adv/MIDNIGHTBSD-SA-20:02.txt and in the release notes at https://www.midnightbsd.org/notes/
To fix CVE-2020-24385, users should update MidnightBSD to version 1.2.6 or higher, and FreeBSD to version 7.0 or higher.