A flaw was found in libvirt while it generates SELinux MCS category pairs for VMs' dynamic labels. This flaw allows one exploited guest to access files labeled for another guest, resulting in the breaking out of sVirt confinement. The highest threat from this vulnerability is to confidentiality and integrity.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2021:3631 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1977726 | Issue Tracking Vendor Advisory |
https://gitlab.com/libvirt/libvirt/-/commit/15073504dbb624d3f6c911e85557019d3620fdb2 | Patch Third Party Advisory |
https://gitlab.com/libvirt/libvirt/-/issues/153 | Exploit Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html | |
https://security.gentoo.org/glsa/202210-06 | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20220331-0010/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
01 Apr 2024, 13:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2022-03-02 23:15
Updated : 2024-04-01 13:16
NVD link : CVE-2021-3631
Mitre link : CVE-2021-3631
CVE.ORG link : CVE-2021-3631
JSON object : View
Products Affected
netapp
- ontap_select_deploy_administration_utility
redhat
- enterprise_linux
- libvirt
- openshift_container_platform
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource