Логотип exploitDog
bind:CVE-2021-46907
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-46907

Количество 6

Количество 6

ubuntu логотип

CVE-2021-46907

почти 2 года назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

EPSS: Низкий
redhat логотип

CVE-2021-46907

почти 2 года назад

A flaw was found in KVM VMX in the Linux Kernel, where ndata' could be updated by the user process at any time

CVSS3: 7.1
EPSS: Низкий
nvd логотип

CVE-2021-46907

почти 2 года назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

EPSS: Низкий
github логотип

GHSA-x3f2-q3jq-26fv

почти 2 года назад

In the Linux kernel, the following vulnerability has been resolved: KVM: VMX: Don't use vcpu->run->internal.ndata as an array index __vmx_handle_exit() uses vcpu->run->internal.ndata as an index for an array access. Since vcpu->run is (can be) mapped to a user address space with a writer permission, the 'ndata' could be updated by the user process at anytime (the user process can set it to outside the bounds of the array). So, it is not safe that __vmx_handle_exit() uses the 'ndata' that way.

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:1870-1

больше 1 года назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:1648-1

больше 1 года назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-46907

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

почти 2 года назад
redhat логотип
CVE-2021-46907

A flaw was found in KVM VMX in the Linux Kernel, where ndata' could be updated by the user process at any time

CVSS3: 7.1
почти 2 года назад
nvd логотип
CVE-2021-46907

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

почти 2 года назад
github логотип
GHSA-x3f2-q3jq-26fv

In the Linux kernel, the following vulnerability has been resolved: KVM: VMX: Don't use vcpu->run->internal.ndata as an array index __vmx_handle_exit() uses vcpu->run->internal.ndata as an index for an array access. Since vcpu->run is (can be) mapped to a user address space with a writer permission, the 'ndata' could be updated by the user process at anytime (the user process can set it to outside the bounds of the array). So, it is not safe that __vmx_handle_exit() uses the 'ndata' that way.

почти 2 года назад
suse-cvrf логотип
SUSE-SU-2024:1870-1

Security update for the Linux Kernel

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:1648-1

Security update for the Linux Kernel

больше 1 года назад

Уязвимостей на страницу