CVE-2021-29628

In FreeBSD 13.0-STABLE before n245764-876ffe28796c, 12.2-STABLE before r369857, 13.0-RELEASE before p1, and 12.2-RELEASE before p7, a system call triggering a fault could cause SMAP protections to be disabled for the duration of the system call. This weakness could be combined with other kernel bugs to craft an exploit.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:freebsd:freebsd:12.2:-:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.2:beta1-p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.2:p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.2:p2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.2:p3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.2:p4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.2:p5:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.2:p6:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:-:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:beta3-p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:rc3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:rc4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:rc5-p1:*:*:*:*:*:*

History

21 Nov 2024, 06:01

Type Values Removed Values Added
References () https://security.FreeBSD.org/advisories/FreeBSD-SA-21:11.smap.asc - Exploit, Vendor Advisory () https://security.FreeBSD.org/advisories/FreeBSD-SA-21:11.smap.asc - Exploit, Vendor Advisory
References () https://security.netapp.com/advisory/ntap-20210713-0002/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20210713-0002/ - Third Party Advisory

Information

Published : 2021-05-28 15:15

Updated : 2024-11-21 06:01


NVD link : CVE-2021-29628

Mitre link : CVE-2021-29628

CVE.ORG link : CVE-2021-29628


JSON object : View

Products Affected

freebsd

  • freebsd
CWE
CWE-863

Incorrect Authorization