Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-22543

Опубликовано: 18 мая 2021
Источник: redhat
CVSS3: 7
EPSS Низкий

Описание

An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.

A flaw was found in the Linux kernel’s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.

Отчет

Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the /dev/kvm device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the qemu-kvm package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose /dev/kvm to unprivileged users by default, as long as the qemu-kvm package is not installed.

Меры по смягчению последствий

Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7kernel-altAffected
Red Hat Enterprise Linux 9kernelNot affected
Red Hat Enterprise Linux 6 Extended Lifecycle SupportkernelFixedRHSA-2022:564019.07.2022
Red Hat Enterprise Linux 7kernel-rtFixedRHSA-2021:380212.10.2021
Red Hat Enterprise Linux 7kpatch-patchFixedRHSA-2021:376812.10.2021
Red Hat Enterprise Linux 7kernelFixedRHSA-2021:380112.10.2021
Red Hat Enterprise Linux 7.2 Advanced Update SupportkernelFixedRHSA-2021:376712.10.2021
Red Hat Enterprise Linux 7.3 Advanced Update SupportkernelFixedRHSA-2021:376612.10.2021
Red Hat Enterprise Linux 7.4 Advanced Update SupportkernelFixedRHSA-2021:372505.10.2021
Red Hat Enterprise Linux 7.6 Advanced Update Support(Disable again in 2026 - SPRHEL-7118)kernelFixedRHSA-2021:381212.10.2021

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-863
https://bugzilla.redhat.com/show_bug.cgi?id=1965461kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks

EPSS

Процентиль: 0%
0.00006
Низкий

7 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 4 лет назад

An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.

CVSS3: 7.8
nvd
около 4 лет назад

An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.

CVSS3: 7.8
debian
около 4 лет назад

An issue was discovered in Linux: KVM through Improper handling of VM_ ...

CVSS3: 7.8
fstec
около 4 лет назад

Уязвимость операционной системы Linux вызвана переполнением буфера, позволяющая нарушителю выполнить произвольную команду управления

suse-cvrf
почти 4 года назад

Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP2)

EPSS

Процентиль: 0%
0.00006
Низкий

7 High

CVSS3