vulnerability

FreeBSD: VID-f8e1e2a6-9791-11eb-b87a-901b0ef719ab (CVE-2021-29627): FreeBSD -- double free in accept_filter(9) socket configuration interface

Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
Apr 7, 2021
Added
Nov 4, 2022
Modified
Dec 10, 2025

Description

Problem Description: An unprivileged process can configure an accept filter on a listening socket. This is done using the setsockopt(2) system call. The process supplies the name of the accept filter which is to be attached to the socket, as well as a string containing filter-specific information. If the filter implements the accf_create callback, the socket option handler attempts to preserve the process-supplied argument string. A bug in the socket option handler caused this string to be freed prematurely, leaving a dangling pointer. Additional operations on the socket can turn this into a double free or a use-after-free. Impact: The bug may be exploited to trigger local privilege escalation or kernel memory disclosure.

Solution

freebsd-upgrade-base-12_2-release-p6
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.