CVE-2021-29626

Published on: 04/07/2021 12:00:00 AM UTC

Last Modified on: 04/16/2021 02:19:00 PM UTC

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Certain versions of Freebsd from Freebsd contain the following vulnerability:

In FreeBSD 13.0-STABLE before n245117, 12.2-STABLE before r369551, 11.4-STABLE before r369559, 13.0-RC5 before p1, 12.2-RELEASE before p6, and 11.4-RELEASE before p9, copy-on-write logic failed to invalidate shared memory page mappings between multiple processes allowing an unpriivleged process to maintain a mapping after it is freed, allowing the process to read private data belonging to other processes or the kernel.

  • CVE-2021-29626 has been assigned by [email protected] to track the vulnerability - currently rated as MEDIUM severity.

CVSS3 Score: 5.5 - MEDIUM

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
LOCAL LOW LOW NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH NONE NONE

CVSS2 Score: 2.1 - LOW

Access
Vector
Access
Complexity
Authentication
LOCAL LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL NONE NONE

CVE References

Description Tags Link
security.FreeBSD.org
text/plain
MISC security.FreeBSD.org/advisories/FreeBSD-SA-21:08.vm.asc

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
FreebsdFreebsdAllAllAllAll
Operating
System
FreebsdFreebsd11.4-AllAll
Operating
System
FreebsdFreebsd11.4beta1AllAll
Operating
System
FreebsdFreebsd11.4p1AllAll
Operating
System
FreebsdFreebsd11.4p2AllAll
Operating
System
FreebsdFreebsd11.4p3AllAll
Operating
System
FreebsdFreebsd11.4p4AllAll
Operating
System
FreebsdFreebsd11.4p5AllAll
Operating
System
FreebsdFreebsd11.4rc1AllAll
Operating
System
FreebsdFreebsd11.4rc2AllAll
Operating
System
FreebsdFreebsd12.2-AllAll
Operating
System
FreebsdFreebsd12.2p1AllAll
Operating
System
FreebsdFreebsd12.2p2AllAll
Operating
System
FreebsdFreebsd13.0beta1AllAll
Operating
System
FreebsdFreebsd13.0beta2AllAll
Operating
System
FreebsdFreebsd13.0beta3AllAll
Operating
System
FreebsdFreebsd13.0beta4AllAll
Operating
System
FreebsdFreebsd13.0rc1AllAll
Operating
System
FreebsdFreebsd13.0rc2AllAll
Operating
System
FreebsdFreebsd13.0rc3AllAll
Operating
System
FreebsdFreebsd13.0rc4AllAll
Operating
System
FreebsdFreebsd13.0rc5AllAll
  • cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:11.4:-:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:11.4:beta1:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:11.4:p1:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:11.4:p2:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:11.4:p3:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:11.4:p4:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:11.4:p5:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:11.4:rc1:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:11.4:rc2:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:12.2:-:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:12.2:p1:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:12.2:p2:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:13.0:beta1:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:13.0:beta2:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:13.0:beta3:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:13.0:beta4:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:13.0:rc1:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:13.0:rc2:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:13.0:rc3:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:13.0:rc4:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:13.0:rc5:*:*:*:*:*:*:

Social Mentions

Source Title Posted (UTC)
Twitter Icon @CVEreport CVE-2021-29626 : In FreeBSD 13.0-STABLE before n245117, 12.2-STABLE before r369551, 11.4-STABLE before r369559, 13.… twitter.com/i/web/status/1… 2021-04-07 15:03:57
Twitter Icon @LinInfoSec Freebsd - CVE-2021-29626: security.FreeBSD.org/advisories/Fre… 2021-04-07 22:28:54
Twitter Icon @DarkEagleCyber CVE-2021-29626 (freebsd) dlvr.it/Rxq9B8 2021-04-16 17:37:33