CWE
416
Advisory Published
Updated

CVE-2021-29626: Use After Free

First published: Wed Apr 07 2021(Updated: )

In FreeBSD 13.0-STABLE before n245117, 12.2-STABLE before r369551, 11.4-STABLE before r369559, 13.0-RC5 before p1, 12.2-RELEASE before p6, and 11.4-RELEASE before p9, copy-on-write logic failed to invalidate shared memory page mappings between multiple processes allowing an unprivileged process to maintain a mapping after it is freed, allowing the process to read private data belonging to other processes or the kernel.

Credit: secteam@freebsd.org

Affected SoftwareAffected VersionHow to fix
FreeBSD FreeBSD<11.4
FreeBSD FreeBSD>=12.0<12.2
FreeBSD FreeBSD=11.4
FreeBSD FreeBSD=11.4-beta1
FreeBSD FreeBSD=11.4-p1
FreeBSD FreeBSD=11.4-p2
FreeBSD FreeBSD=11.4-p3
FreeBSD FreeBSD=11.4-p4
FreeBSD FreeBSD=11.4-p5
FreeBSD FreeBSD=11.4-rc1
FreeBSD FreeBSD=11.4-rc2
FreeBSD FreeBSD=12.2
FreeBSD FreeBSD=12.2-p1
FreeBSD FreeBSD=12.2-p2
FreeBSD FreeBSD=13.0-beta1
FreeBSD FreeBSD=13.0-beta2
FreeBSD FreeBSD=13.0-beta3
FreeBSD FreeBSD=13.0-beta4
FreeBSD FreeBSD=13.0-rc1
FreeBSD FreeBSD=13.0-rc2
FreeBSD FreeBSD=13.0-rc3
FreeBSD FreeBSD=13.0-rc4
FreeBSD FreeBSD=13.0-rc5

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2021-29626?

    CVE-2021-29626 is a vulnerability in FreeBSD that allows an unprivileged process to access sensitive information.

  • What is the severity of CVE-2021-29626?

    CVE-2021-29626 has a severity score of 5.5, which is considered medium.

  • Which versions of FreeBSD are affected by CVE-2021-29626?

    FreeBSD 13.0-STABLE before n245117, 12.2-STABLE before r369551, 11.4-STABLE before r369559, 13.0-RC5 before p1, 12.2-RELEASE before p6, and 11.4-RELEASE before p9 are affected by CVE-2021-29626.

  • How does CVE-2021-29626 work?

    CVE-2021-29626 occurs due to copy-on-write logic failing to invalidate shared memory page mappings between processes, allowing an unprivileged process to access sensitive information.

  • How can I fix CVE-2021-29626?

    To fix CVE-2021-29626, it is recommended to update to FreeBSD 13.0-STABLE n245117, 12.2-STABLE r369551, 11.4-STABLE r369559, 13.0-RC5 p1, 12.2-RELEASE p6, or 11.4-RELEASE p9 or later versions.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203