In FreeBSD 13.0-STABLE before n245117, 12.2-STABLE before r369551, 11.4-STABLE before r369559, 13.0-RC5 before p1, 12.2-RELEASE before p6, and 11.4-RELEASE before p9, copy-on-write logic failed to invalidate shared memory page mappings between multiple processes allowing an unprivileged process to maintain a mapping after it is freed, allowing the process to read private data belonging to other processes or the kernel.
References
Link | Resource |
---|---|
https://security.FreeBSD.org/advisories/FreeBSD-SA-21:08.vm.asc | Vendor Advisory |
https://security.netapp.com/advisory/ntap-20210423-0008/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
27 May 2022, 13:22
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) https://security.netapp.com/advisory/ntap-20210423-0008/ - Third Party Advisory |
23 Apr 2021, 06:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Apr 2021, 14:15
Type | Values Removed | Values Added |
---|---|---|
Summary | In FreeBSD 13.0-STABLE before n245117, 12.2-STABLE before r369551, 11.4-STABLE before r369559, 13.0-RC5 before p1, 12.2-RELEASE before p6, and 11.4-RELEASE before p9, copy-on-write logic failed to invalidate shared memory page mappings between multiple processes allowing an unprivileged process to maintain a mapping after it is freed, allowing the process to read private data belonging to other processes or the kernel. |
16 Apr 2021, 14:19
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:freebsd:freebsd:13.0:beta1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:rc4:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:beta4:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:11.4:rc1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:11.4:p3:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:rc2:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:11.4:beta1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:rc5:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:11.4:-:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:rc1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:rc3:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:11.4:p1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:beta3:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:12.2:p2:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:12.2:p1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:11.4:p4:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:beta2:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:11.4:p5:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:11.4:rc2:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:12.2:-:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:11.4:p2:*:*:*:*:*:* |
|
References | (MISC) https://security.FreeBSD.org/advisories/FreeBSD-SA-21:08.vm.asc - Vendor Advisory | |
CWE | CWE-416 | |
CVSS |
v2 : v3 : |
v2 : 2.1
v3 : 5.5 |
07 Apr 2021, 15:38
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-04-07 15:15
Updated : 2023-12-10 13:55
NVD link : CVE-2021-29626
Mitre link : CVE-2021-29626
CVE.ORG link : CVE-2021-29626
JSON object : View
Products Affected
freebsd
- freebsd
CWE
CWE-416
Use After Free