CVE-2021-46907

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVSS

No CVSS.

References

No reference.

Configurations

No configuration.

History

19 Mar 2024, 13:15

Type Values Removed Values Added
References
  • {'url': 'https://git.kernel.org/stable/c/7f64753835a78c7d2cc2932a5808ef3b7fd4c050', 'name': 'https://git.kernel.org/stable/c/7f64753835a78c7d2cc2932a5808ef3b7fd4c050', 'tags': [], 'refsource': ''}
  • {'url': 'https://git.kernel.org/stable/c/ce541d7b59566a0d94c7c99bfb5d34b050e6af70', 'name': 'https://git.kernel.org/stable/c/ce541d7b59566a0d94c7c99bfb5d34b050e6af70', 'tags': [], 'refsource': ''}
  • {'url': 'https://git.kernel.org/stable/c/04c4f2ee3f68c9a4bf1653d15f1a9a435ae33f7a', 'name': 'https://git.kernel.org/stable/c/04c4f2ee3f68c9a4bf1653d15f1a9a435ae33f7a', 'tags': [], 'refsource': ''}
Summary In the Linux kernel, the following vulnerability has been resolved: KVM: VMX: Don't use vcpu->run->internal.ndata as an array index __vmx_handle_exit() uses vcpu->run->internal.ndata as an index for an array access. Since vcpu->run is (can be) mapped to a user address space with a writer permission, the 'ndata' could be updated by the user process at anytime (the user process can set it to outside the bounds of the array). So, it is not safe that __vmx_handle_exit() uses the 'ndata' that way. Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

27 Feb 2024, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-27 07:15

Updated : 2024-04-16 18:42


NVD link : CVE-2021-46907

Mitre link : CVE-2021-46907

CVE.ORG link : CVE-2021-46907


JSON object : View

Products Affected

No product.

CWE

No CWE.