First published: Tue Apr 28 2020(Updated: )
In FreeBSD 12.1-STABLE before r358739, 12.1-RELEASE before 12.1-RELEASE-p3, 11.3-STABLE before r358740, and 11.3-RELEASE before 11.3-RELEASE-p7, a TCP SYN-ACK or challenge TCP-ACK segment over IPv6 that is transmitted or retransmitted does not properly initialize the Traffic Class field disclosing one byte of kernel memory over the network.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD FreeBSD | =11.3 | |
FreeBSD FreeBSD | =11.3-p1 | |
FreeBSD FreeBSD | =11.3-p2 | |
FreeBSD FreeBSD | =11.3-p3 | |
FreeBSD FreeBSD | =11.3-p4 | |
FreeBSD FreeBSD | =11.3-p5 | |
FreeBSD FreeBSD | =11.3-p6 | |
FreeBSD FreeBSD | =12.1 | |
FreeBSD FreeBSD | =12.1-p1 | |
FreeBSD FreeBSD | =12.1-p2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7451 is a vulnerability in FreeBSD that allows an attacker to disclose information from the Traffic Class field of a TCP SYN-ACK or challenge TCP-ACK segment over IPv6.
FreeBSD 12.1-STABLE before r358739, 12.1-RELEASE before 12.1-RELEASE-p3, 11.3-STABLE before r358740, and 11.3-RELEASE before 11.3-RELEASE-p7 are affected.
CVE-2020-7451 has a severity score of 5.3 (Medium).
To fix CVE-2020-7451, users should update to FreeBSD 12.1-STABLE r358739, 12.1-RELEASE-p3, 11.3-STABLE r358740, or 11.3-RELEASE-p7.
More information about CVE-2020-7451 can be found at https://security.FreeBSD.org/advisories/FreeBSD-SA-20:04.tcp.asc.