A flaw was found in the Linux kernel in versions before 5.12. The value of internal.ndata, in the KVM API, is mapped to an array index, which can be updated by a user process at anytime which could lead to an out-of-bounds write. The highest threat from this vulnerability is to data integrity and system availability.
[
{
"signature_version": "v1",
"signature_type": "Line",
"target": {
"file": "arch/x86/kvm/vmx/vmx.c"
},
"id": "CVE-2021-3501-5756287b",
"digest": {
"line_hashes": [
"269426812894681229925191221266775975419",
"125177580148737741560233129712065697401",
"139768033346909044318497138805129078465",
"107590212830701058383507410145128826789",
"265440139703330611465081943257705546720",
"115826472126788773574451281193238763330",
"69050417516390421201097858078819928226",
"319839744529021663690881385000392678362",
"21874155242032712907282542695052650452",
"301443942158641119380196954227490289909",
"181166251320990619965491426290180378558",
"210253325523775238959896384404843504900",
"304164241116515091568477398842462999848",
"224378331362183497222620786063193875065",
"251828512003316140557321299447730889888",
"270745083856390991014668330259266672269",
"143841222763082563097636084837162935468"
],
"threshold": 0.9
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@04c4f2ee3f68c9a4bf1653d15f1a9a435ae33f7a"
},
{
"signature_version": "v1",
"signature_type": "Function",
"target": {
"file": "arch/x86/kvm/vmx/vmx.c",
"function": "__vmx_handle_exit"
},
"id": "CVE-2021-3501-c59ec54d",
"digest": {
"function_hash": "331506563304759509880284074240815900620",
"length": 3580.0
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@04c4f2ee3f68c9a4bf1653d15f1a9a435ae33f7a"
}
]