An unprivileged local user process can maintain a mapping of a page after it is freed, allowing that process to read private data belonging to other processes or the kernel.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-28196 | A particular case of memory sharing is mishandled in the virtual memory system. This is very similar to SA-21:08.vm, but with a different root cause. An unprivileged local user process can maintain a mapping of a page after it is freed, allowing that process to read private data belonging to other processes or the kernel. |
Wed, 04 Jun 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Freebsd
Freebsd freebsd |
|
| CPEs | cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:12.3:beta1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:12.3:p1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:12.3:p2:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:12.3:p3:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:12.3:p4:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:12.3:p5:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:-:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:beta1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:beta2:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:beta3-p1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:beta3:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:beta4:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:p10:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:p11:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:p1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:p2:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:p3:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:p4:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:p5:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:p6:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:p7:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:p8:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:p9:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:rc1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:rc2:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:rc3:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:rc4:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:rc5-p1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:rc5:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.1:b1-p1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.1:b2-p2:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.1:rc1-p1:*:*:*:*:*:* |
|
| Vendors & Products |
Freebsd
Freebsd freebsd |
Mon, 28 Oct 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-401 | |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: freebsd
Published:
Updated: 2025-02-13T16:29:02.596Z
Reserved: 2022-01-10T22:07:46.042Z
Link: CVE-2022-23091
Updated: 2024-08-03T03:28:43.503Z
Status : Analyzed
Published: 2024-02-15T06:15:45.147
Modified: 2025-06-04T22:09:07.247
Link: CVE-2022-23091
No data.
OpenCVE Enrichment
No data.
EUVD