First published: Fri Mar 26 2021(Updated: )
In FreeBSD 12.2-STABLE before r369346, 11.4-STABLE before r369345, 12.2-RELEASE before p4 and 11.4-RELEASE before p8 a regression in the login.access(5) rule processor has the effect of causing rules to fail to match even when they should not. This means that rules denying access may be ignored.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD FreeBSD | =11.4 | |
FreeBSD FreeBSD | =11.4-p1 | |
FreeBSD FreeBSD | =11.4-p2 | |
FreeBSD FreeBSD | =11.4-p3 | |
FreeBSD FreeBSD | =11.4-p4 | |
FreeBSD FreeBSD | =11.4-p5 | |
FreeBSD FreeBSD | =11.4-p6 | |
FreeBSD FreeBSD | =11.4-p7 | |
FreeBSD FreeBSD | =12.2 | |
FreeBSD FreeBSD | =12.2-p1 | |
FreeBSD FreeBSD | =12.2-p2 | |
FreeBSD FreeBSD | =12.2-p3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25580 is a vulnerability in FreeBSD that affects versions 11.4 and 12.2.
The severity of CVE-2020-25580 is medium with a severity value of 5.3.
CVE-2020-25580 in FreeBSD causes a regression in the login.access(5) rule processor, resulting in rules failing to match correctly.
CVE-2020-25580 affects FreeBSD versions 11.4 and 12.2.
To fix CVE-2020-25580, it is recommended to update to FreeBSD version 11.4-p8 or 12.2-p4 or later.