First published: Tue Apr 13 2021(Updated: )
A flaw was found in libvirt while it generates SELinux MCS category pairs for VMs' dynamic labels. This flaw allows one exploited guest to access files labeled for another guest, resulting in the breaking out of sVirt confinement. The highest threat from this vulnerability is to confidentiality and integrity.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Libvirt | <7.5.0 | |
Redhat Openshift Container Platform | =4.8 | |
Redhat Enterprise Linux | =8.0 | |
NetApp ONTAP Select Deploy administration utility | ||
redhat/libvirt | <7.5.0 | 7.5.0 |
debian/libvirt | 7.0.0-3+deb11u3 9.0.0-4+deb12u1 10.7.0-3 |
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2021-3631.
The severity level of CVE-2021-3631 is low.
CVE-2021-3631 poses a threat to confidentiality.
Versions 6.0.0-0ubuntu8.16, 7.6.0-1, 4.0.0-1ubuntu8.21, 7.6.0-0ubuntu3, 7.6.0-0ubuntu3, 7.6.0-0ubuntu3, 7.5.0, 9.0.0-4, and 9.7.0-1 of libvirt are affected by CVE-2021-3631.
Run the recommended updates for the affected libvirt versions.