A flaw was found in libvirt while it generates SELinux MCS category pairs for VMs' dynamic labels. This flaw allows one exploited guest to access files labeled for another guest, resulting in the breaking out of sVirt confinement. The highest threat from this vulnerability is to confidentiality and integrity.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2021:3631 | Vendor Advisory |
https://gitlab.com/libvirt/libvirt/-/commit/15073504dbb624d3f6c911e85557019d3620fdb2 | Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1977726 | Issue Tracking Vendor Advisory |
https://gitlab.com/libvirt/libvirt/-/issues/153 | Exploit Third Party Advisory |
https://security.netapp.com/advisory/ntap-20220331-0010/ | Third Party Advisory |
https://security.gentoo.org/glsa/202210-06 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2022-03-02 15:15
Updated : 2022-10-16 10:15
NVD link : CVE-2021-3631
Mitre link : CVE-2021-3631
JSON object : View
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource
Products Affected
redhat
- openshift_container_platform
- enterprise_linux
- libvirt
netapp
- ontap_select_deploy_administration_utility