{"api_version":"1","generated_at":"2026-04-23T04:20:43+00:00","cve":"CVE-2021-3631","urls":{"html":"https://cve.report/CVE-2021-3631","api":"https://cve.report/api/cve/CVE-2021-3631.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-3631","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-3631"},"summary":{"title":"CVE-2021-3631","description":"A flaw was found in libvirt while it generates SELinux MCS category pairs for VMs' dynamic labels. This flaw allows one exploited guest to access files labeled for another guest, resulting in the breaking out of sVirt confinement. The highest threat from this vulnerability is to confidentiality and integrity.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2022-03-02 23:15:00","updated_at":"2024-04-01 13:16:00"},"problem_types":["CWE-732"],"metrics":[],"references":[{"url":"https://access.redhat.com/errata/RHSA-2021:3631","name":"https://access.redhat.com/errata/RHSA-2021:3631","refsource":"MISC","tags":[],"title":"Red Hat Customer Portal - Access to 24x7 support and knowledge","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html","name":"[debian-lts-announce] 20240401 [SECURITY] [DLA 3778-1] libvirt security update","refsource":"","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1977726","name":"https://bugzilla.redhat.com/show_bug.cgi?id=1977726","refsource":"MISC","tags":[],"title":"1977726 – (CVE-2021-3631) CVE-2021-3631 libvirt: Insecure sVirt label generation","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security.gentoo.org/glsa/202210-06","name":"GLSA-202210-06","refsource":"GENTOO","tags":[],"title":"libvirt: Multiple Vulnerabilities (GLSA 202210-06) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://gitlab.com/libvirt/libvirt/-/issues/153","name":"https://gitlab.com/libvirt/libvirt/-/issues/153","refsource":"MISC","tags":[],"title":"Selinux MCS generate a single category context and may be accessed by another machine (#153) · Issues · libvirt / libvirt · GitLab","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.netapp.com/advisory/ntap-20220331-0010/","name":"https://security.netapp.com/advisory/ntap-20220331-0010/","refsource":"CONFIRM","tags":[],"title":"CVE-2021-3631 Libvirt Vulnerability in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://gitlab.com/libvirt/libvirt/-/commit/15073504dbb624d3f6c911e85557019d3620fdb2","name":"https://gitlab.com/libvirt/libvirt/-/commit/15073504dbb624d3f6c911e85557019d3620fdb2","refsource":"MISC","tags":[],"title":"security: fix SELinux label generation logic (15073504) · Commits · libvirt / libvirt · GitLab","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-3631","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3631","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"3631","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netapp","cpe5":"ontap_select_deploy_administration_utility","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"3631","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"advanced_virtualization","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"3631","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"libvirt","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"3631","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openshift_container_platform","cpe6":"4.8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-3631","qid":"159468","title":"Oracle Enterprise Linux Security Update for virt:ol and virt-devel:ol (ELSA-2021-4191)"},{"cve":"CVE-2021-3631","qid":"160343","title":"Oracle Enterprise Linux Security Update for libvirt (ELSA-2022-10062)"},{"cve":"CVE-2021-3631","qid":"160365","title":"Oracle Enterprise Linux Security Update for virt:kvm_utils (ELSA-2022-10093)"},{"cve":"CVE-2021-3631","qid":"160453","title":"Oracle Enterprise Linux Security Update for virt:kvm_utils (ELSA-2023-12108)"},{"cve":"CVE-2021-3631","qid":"184879","title":"Debian Security Update for libvirt (CVE-2021-3631)"},{"cve":"CVE-2021-3631","qid":"198763","title":"Ubuntu Security Notification for libvirt Vulnerabilities (USN-5399-1)"},{"cve":"CVE-2021-3631","qid":"239833","title":"Red Hat Update for virt:rhel and virt-devel:rhel security (RHSA-2021:4191)"},{"cve":"CVE-2021-3631","qid":"281714","title":"Fedora Security Update for libvirt (FEDORA-2021-bc6ad65da0)"},{"cve":"CVE-2021-3631","qid":"377413","title":"Alibaba Cloud Linux Security Update for virt:rhel and virt-devel:rhel (ALINUX3-SA-2022:0119)"},{"cve":"CVE-2021-3631","qid":"502116","title":"Alpine Linux Security Update for libvirt"},{"cve":"CVE-2021-3631","qid":"6000552","title":"Debian Security Update for libvirt (DLA 3778-1)"},{"cve":"CVE-2021-3631","qid":"710643","title":"Gentoo Linux libvirt Multiple Vulnerabilities (GLSA 202210-06)"},{"cve":"CVE-2021-3631","qid":"750955","title":"OpenSUSE Security Update for libvirt (openSUSE-SU-2021:1119-1)"},{"cve":"CVE-2021-3631","qid":"751003","title":"OpenSUSE Security Update for libvirt (openSUSE-SU-2021:2812-1)"},{"cve":"CVE-2021-3631","qid":"900736","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for libvirt (8880)"},{"cve":"CVE-2021-3631","qid":"940172","title":"AlmaLinux Security Update for virt:rhel and virt-devel:rhel (ALSA-2021:4191)"},{"cve":"CVE-2021-3631","qid":"960274","title":"Rocky Linux Security Update for virt:rhel and virt-devel:rhel (RLSA-2021:4191)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2021-3631","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"libvirt","version":{"version_data":[{"version_value":"Fixed-In - libvirt v7.5.0"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-732"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://bugzilla.redhat.com/show_bug.cgi?id=1977726","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1977726"},{"refsource":"MISC","name":"https://gitlab.com/libvirt/libvirt/-/issues/153","url":"https://gitlab.com/libvirt/libvirt/-/issues/153"},{"refsource":"MISC","name":"https://gitlab.com/libvirt/libvirt/-/commit/15073504dbb624d3f6c911e85557019d3620fdb2","url":"https://gitlab.com/libvirt/libvirt/-/commit/15073504dbb624d3f6c911e85557019d3620fdb2"},{"refsource":"MISC","name":"https://access.redhat.com/errata/RHSA-2021:3631","url":"https://access.redhat.com/errata/RHSA-2021:3631"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20220331-0010/","url":"https://security.netapp.com/advisory/ntap-20220331-0010/"},{"refsource":"GENTOO","name":"GLSA-202210-06","url":"https://security.gentoo.org/glsa/202210-06"}]},"description":{"description_data":[{"lang":"eng","value":"A flaw was found in libvirt while it generates SELinux MCS category pairs for VMs' dynamic labels. This flaw allows one exploited guest to access files labeled for another guest, resulting in the breaking out of sVirt confinement. The highest threat from this vulnerability is to confidentiality and integrity."}]}},"nvd":{"publishedDate":"2022-03-02 23:15:00","lastModifiedDate":"2024-04-01 13:16:00","problem_types":["CWE-732"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":6.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":1,"impactScore":5.2},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:M/Au:N/C:P/I:P/A:N","accessVector":"LOCAL","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":3.3},"severity":"LOW","exploitabilityScore":3.4,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*","versionEndExcluding":"7.5.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:openshift_container_platform:4.8:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"3631","Ordinal":"211470","Title":"CVE-2021-3631","CVE":"CVE-2021-3631","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"3631","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}