Use After Free The advisory has been revoked - it doesn't affect any version of package kfreebsd-10 Open this link in a new tab
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIANUNSTABLE-KFREEBSD10-1244579
- published 9 Apr 2021
- disclosed 7 Apr 2021
Introduced: 7 Apr 2021
CVE-2021-29626 Open this link in a new tabAmendment
The Debian
security team deemed this advisory irrelevant for Debian:unstable
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kfreebsd-10
package and not the kfreebsd-10
package as distributed by Debian
.
In FreeBSD 13.0-STABLE before n245117, 12.2-STABLE before r369551, 11.4-STABLE before r369559, 13.0-RC5 before p1, 12.2-RELEASE before p6, and 11.4-RELEASE before p9, copy-on-write logic failed to invalidate shared memory page mappings between multiple processes allowing an unprivileged process to maintain a mapping after it is freed, allowing the process to read private data belonging to other processes or the kernel.