7.8

CVE-2021-29627

In FreeBSD 13.0-STABLE before n245050, 12.2-STABLE before r369525, 13.0-RC4 before p0, and 12.2-RELEASE before p6, listening socket accept filters implementing the accf_create callback incorrectly freed a process supplied argument string. Additional operations on the socket can lead to a double free or use after free.

Data is provided by the National Vulnerability Database (NVD)
FreebsdFreebsd Version >= 12.0 < 12.2
FreebsdFreebsd Version12.2 Update-
FreebsdFreebsd Version12.2 Updatep1
FreebsdFreebsd Version12.2 Updatep2
FreebsdFreebsd Version13.0 Updatebeta1
FreebsdFreebsd Version13.0 Updatebeta2
FreebsdFreebsd Version13.0 Updatebeta3
FreebsdFreebsd Version13.0 Updatebeta4
FreebsdFreebsd Version13.0 Updaterc1
FreebsdFreebsd Version13.0 Updaterc2
FreebsdFreebsd Version13.0 Updaterc3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 1.05% 0.766
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.2 3.9 10
AV:L/AC:L/Au:N/C:C/I:C/A:C
CWE-415 Double Free

The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations.

CWE-416 Use After Free

The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.