arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
07 Nov 2023, 03:36
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
18 Oct 2021, 11:55
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) https://security.netapp.com/advisory/ntap-20210917-0005/ - Third Party Advisory | |
References | (DEBIAN) https://www.debian.org/security/2021/dsa-4978 - Third Party Advisory |
25 Sep 2021, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
17 Sep 2021, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
05 Aug 2021, 18:09
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-787 | |
CVSS |
v2 : v3 : |
v2 : 7.2
v3 : 7.8 |
References |
|
|
References | (MISC) https://lore.kernel.org/linuxppc-dev/87im0x1lqi.fsf@mpe.ellerman.id.au/T/#u - Exploit, Mailing List, Patch, Vendor Advisory | |
References | (MISC) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a - Patch, Vendor Advisory | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2021/07/27/2 - Exploit, Mailing List, Patch, Third Party Advisory | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:* |
02 Aug 2021, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
26 Jul 2021, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-07-26 22:15
Updated : 2023-12-10 13:55
NVD link : CVE-2021-37576
Mitre link : CVE-2021-37576
CVE.ORG link : CVE-2021-37576
JSON object : View
Products Affected
linux
- linux_kernel
fedoraproject
- fedora
CWE
CWE-787
Out-of-bounds Write