Vulnerability Description
In FreeBSD 13.0-STABLE before n245764-876ffe28796c, 12.2-STABLE before r369857, 13.0-RELEASE before p1, and 12.2-RELEASE before p7, a system call triggering a fault could cause SMAP protections to be disabled for the duration of the system call. This weakness could be combined with other kernel bugs to craft an exploit.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freebsd | Freebsd | 12.2 |
Related Weaknesses (CWE)
References
- https://security.FreeBSD.org/advisories/FreeBSD-SA-21:11.smap.ascExploitVendor Advisory
- https://security.netapp.com/advisory/ntap-20210713-0002/Third Party Advisory
- https://security.FreeBSD.org/advisories/FreeBSD-SA-21:11.smap.ascExploitVendor Advisory
- https://security.netapp.com/advisory/ntap-20210713-0002/Third Party Advisory
FAQ
What is CVE-2021-29628?
CVE-2021-29628 is a vulnerability with a CVSS score of 7.5 (HIGH). In FreeBSD 13.0-STABLE before n245764-876ffe28796c, 12.2-STABLE before r369857, 13.0-RELEASE before p1, and 12.2-RELEASE before p7, a system call triggering a fault could cause SMAP protections to be ...
How severe is CVE-2021-29628?
CVE-2021-29628 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-29628?
Check the references section above for vendor advisories and patch information. Affected products include: Freebsd Freebsd.