First published: Fri Mar 26 2021(Updated: )
In FreeBSD 12.1-STABLE before r364644, 11.4-STABLE before r364651, 12.1-RELEASE before p9, 11.4-RELEASE before p3, and 11.3-RELEASE before p13, improper handling in the kernel causes a use-after-free bug by sending large user messages from multiple threads on the same SCTP socket. The use-after-free situation may result in unintended kernel behaviour including a kernel panic.
Credit: Megan2013678 Megan2013678 Megan2013678 Megan2013678 Megan2013678 Megan2013678 Megan2013678 secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Safari | <14.1 | 14.1 |
Apple iTunes for Windows | <12.11.3 | 12.11.3 |
Apple iCloud for Windows | <12.3 | 12.3 |
Apple macOS Big Sur | <11.3 | 11.3 |
Apple tvOS | <14.5 | 14.5 |
Apple watchOS | <7.4 | 7.4 |
Apple iOS | <14.5 | 14.5 |
Apple iPadOS | <14.5 | 14.5 |
FreeBSD FreeBSD | =11.3 | |
FreeBSD FreeBSD | =11.3-p1 | |
FreeBSD FreeBSD | =11.3-p10 | |
FreeBSD FreeBSD | =11.3-p11 | |
FreeBSD FreeBSD | =11.3-p12 | |
FreeBSD FreeBSD | =11.3-p2 | |
FreeBSD FreeBSD | =11.3-p3 | |
FreeBSD FreeBSD | =11.3-p4 | |
FreeBSD FreeBSD | =11.3-p5 | |
FreeBSD FreeBSD | =11.3-p6 | |
FreeBSD FreeBSD | =11.3-p7 | |
FreeBSD FreeBSD | =11.3-p8 | |
FreeBSD FreeBSD | =11.3-p9 | |
FreeBSD FreeBSD | =11.4 | |
FreeBSD FreeBSD | =11.4-p1 | |
FreeBSD FreeBSD | =11.4-p2 | |
FreeBSD FreeBSD | =12.1 | |
FreeBSD FreeBSD | =12.1-p1 | |
FreeBSD FreeBSD | =12.1-p2 | |
FreeBSD FreeBSD | =12.1-p3 | |
FreeBSD FreeBSD | =12.1-p4 | |
FreeBSD FreeBSD | =12.1-p5 | |
FreeBSD FreeBSD | =12.1-p6 | |
FreeBSD FreeBSD | =12.1-p7 | |
FreeBSD FreeBSD | =12.1-p8 | |
FreeBSD FreeBSD | =12.2 | |
Apple Icloud Windows | <12.3 | |
Apple Itunes Windows | <12.11.3 | |
Apple Safari | <14.1 | |
Apple iPadOS | <14.5 | |
Apple iPhone OS | <14.5 | |
Apple macOS | >=11.0<11.3 | |
Apple tvOS | <14.5 | |
Apple watchOS | <7.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2020-7463 is a use after free vulnerability in WebRTC that has been addressed with improved memory management.
CVE-2020-7463 may allow a remote attacker to cause unexpected system termination or corrupt kernel memory.
The following Apple software products are affected by CVE-2020-7463: Safari 14.1, iOS 14.5, iPadOS 14.5, watchOS 7.4, iTunes for Windows 12.11.3, iCloud for Windows 12.3, macOS Big Sur 11.3, and tvOS 14.5.
To fix CVE-2020-7463, it is recommended to update your affected Apple software products to the latest versions.
More information about CVE-2020-7463 can be found in the references provided by Apple: [Reference 1](https://support.apple.com/en-us/HT212321), [Reference 2](https://support.apple.com/en-us/HT212317), [Reference 3](https://support.apple.com/en-us/HT212318).