First published: Fri May 28 2021(Updated: )
In FreeBSD 13.0-STABLE before n245764-876ffe28796c, 12.2-STABLE before r369857, 13.0-RELEASE before p1, and 12.2-RELEASE before p7, a system call triggering a fault could cause SMAP protections to be disabled for the duration of the system call. This weakness could be combined with other kernel bugs to craft an exploit.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD FreeBSD | =12.2 | |
FreeBSD FreeBSD | =12.2-beta1-p1 | |
FreeBSD FreeBSD | =12.2-p1 | |
FreeBSD FreeBSD | =12.2-p2 | |
FreeBSD FreeBSD | =12.2-p3 | |
FreeBSD FreeBSD | =12.2-p4 | |
FreeBSD FreeBSD | =12.2-p5 | |
FreeBSD FreeBSD | =12.2-p6 | |
FreeBSD FreeBSD | =13.0 | |
FreeBSD FreeBSD | =13.0-beta3-p1 | |
FreeBSD FreeBSD | =13.0-rc3 | |
FreeBSD FreeBSD | =13.0-rc4 | |
FreeBSD FreeBSD | =13.0-rc5-p1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-29628 is a vulnerability in FreeBSD that allows a system call triggering a fault to disable SMAP protections.
CVE-2021-29628 affects FreeBSD versions 13.0-STABLE before n245764-876ffe28796c, 12.2-STABLE before r369857, 13.0-RELEASE before p1, and 12.2-RELEASE before p7.
The severity of CVE-2021-29628 is high with a CVSS score of 7.5.
To fix CVE-2021-29628, upgrade to FreeBSD versions n245764-876ffe28796c, r369857, p1, or p7 depending on the affected release.
You can find more information about CVE-2021-29628 in the advisory published by FreeBSD and NetApp.