A particular case of memory sharing is mishandled in the virtual memory system. This is very similar to SA-21:08.vm, but with a different root cause. An unprivileged local user process can maintain a mapping of a page after it is freed, allowing that process to read private data belonging to other processes or the kernel.
| Date Added | Due Date | Vulnerability Name | Required Action |
|---|---|---|---|
| N/A |
| Type | Version | Base score | Base severity | Vector |
|---|---|---|---|---|
| Secondary | 3.1 | 4.0 | MEDIUM | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
| Hyperlink | Source | Resource |
|---|---|---|
| https://security.freebsd.org/advisories/FreeBSD-SA-22:11.vm.asc | secteam@freebsd.org | Vendor Advisory |
| https://security.netapp.com/advisory/ntap-20240415-0008/ | secteam@freebsd.org | Third Party Advisory |
| https://security.freebsd.org/advisories/FreeBSD-SA-22:11.vm.asc | af854a3a-2127-422b-91ae-364da2661108 | Vendor Advisory |
| https://security.netapp.com/advisory/ntap-20240415-0008/ | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |