cvelist/2021/22xxx/CVE-2021-22543.json
2021-12-17 01:01:05 +00:00

130 lines
4.6 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "security@google.com",
"DATE_PUBLIC": "2021-05-18T10:00:00.000Z",
"ID": "CVE-2021-22543",
"STATE": "PUBLIC",
"TITLE": "Improper memory handling in Linux KVM"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "David Stevens"
},
{
"lang": "eng",
"value": "Kevin Hamacher"
},
{
"lang": "eng",
"value": "Jann Horn"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"name": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20210626 Re: CVE-2021-22543 - /dev/kvm LPE",
"url": "http://www.openwall.com/lists/oss-security/2021/06/26/1"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2021-fe826f202e",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4G5YBUVEPHZYXMKNGBZ3S6INFCTEEL4E/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2021-95f2f1cfc7",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ROQIXQB7ZAWI3KSGSHR6H5RDUWZI775S/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210708-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210708-0002/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"
}
]
},
"source": {
"discovery": "EXTERNAL"
}
}