{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T20:13:17.145","vulnerabilities":[{"cve":{"id":"CVE-2021-22556","sourceIdentifier":"cve-coordination@google.com","published":"2022-05-03T16:15:18.627","lastModified":"2024-11-21T05:50:19.533","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Security Team discovered an integer overflow bug that allows an attacker with code execution to issue memory cache invalidation operations on pages that they don’t own, allowing them to control kernel memory from userspace. We recommend upgrading to kernel version 4.1 or beyond."},{"lang":"es","value":"El equipo de seguridad detectó un fallo de desbordamiento de enteros que permite a un atacante con ejecución de código emitir operaciones de no comprobación de la caché de memoria en páginas que no posee, lo que le permite controlar la memoria del kernel desde el espacio de usuario. Es recomendado actualizar a la versión 4.1 del kernel o superior"}],"metrics":{"cvssMetricV31":[{"source":"cve-coordination@google.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.0,"impactScore":4.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"cve-coordination@google.com","type":"Secondary","description":[{"lang":"en","value":"CWE-190"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-190"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:google:fuchsia:*:*:*:*:*:*:*:*","versionEndExcluding":"4.1","matchCriteriaId":"30CB1FE3-A9A9-43D7-9F7A-D5F2DB4DF462"}]}]}],"references":[{"url":"https://fuchsia-review.googlesource.com/c/fuchsia/+/570881","source":"cve-coordination@google.com","tags":["Issue Tracking","Patch","Third Party Advisory"]},{"url":"https://fuchsia.dev/whats-new/release-notes/f4-1","source":"cve-coordination@google.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https://fuchsia-review.googlesource.com/c/fuchsia/+/570881","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Patch","Third Party Advisory"]},{"url":"https://fuchsia.dev/whats-new/release-notes/f4-1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes","Vendor Advisory"]}]}}]}