Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-29657

Опубликовано: 22 июл. 2021
Источник: nvd
CVSS3: 7.4
CVSS2: 6.9
EPSS Низкий

Описание

arch/x86/kvm/svm/nested.c in the Linux kernel before 5.11.12 has a use-after-free in which an AMD KVM guest can bypass access control on host OS MSRs when there are nested guests, aka CID-a58d9166a756. This occurs because of a TOCTOU race condition associated with a VMCB12 double fetch in nested_svm_vmrun.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Версия от 5.10 (включая) до 5.10.28 (исключая)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Версия от 5.11 (включая) до 5.11.12 (исключая)

EPSS

Процентиль: 13%
0.00043
Низкий

7.4 High

CVSS3

6.9 Medium

CVSS2

Дефекты

CWE-367

Связанные уязвимости

CVSS3: 7.4
ubuntu
больше 4 лет назад

arch/x86/kvm/svm/nested.c in the Linux kernel before 5.11.12 has a use-after-free in which an AMD KVM guest can bypass access control on host OS MSRs when there are nested guests, aka CID-a58d9166a756. This occurs because of a TOCTOU race condition associated with a VMCB12 double fetch in nested_svm_vmrun.

CVSS3: 7.8
redhat
почти 5 лет назад

arch/x86/kvm/svm/nested.c in the Linux kernel before 5.11.12 has a use-after-free in which an AMD KVM guest can bypass access control on host OS MSRs when there are nested guests, aka CID-a58d9166a756. This occurs because of a TOCTOU race condition associated with a VMCB12 double fetch in nested_svm_vmrun.

CVSS3: 7.4
msrc
больше 4 лет назад

arch/x86/kvm/svm/nested.c in the Linux kernel before 5.11.12 has a use-after-free in which an AMD KVM guest can bypass access control on host OS MSRs when there are nested guests aka CID-a58d9166a756. This occurs because of a TOCTOU race condition associated with a VMCB12 double fetch in nested_svm_vmrun.

CVSS3: 7.4
debian
больше 4 лет назад

arch/x86/kvm/svm/nested.c in the Linux kernel before 5.11.12 has a use ...

CVSS3: 7.4
github
больше 3 лет назад

arch/x86/kvm/svm/nested.c in the Linux kernel before 5.11.12 has a use-after-free in which an AMD KVM guest can bypass access control on host OS MSRs when there are nested guests, aka CID-a58d9166a756. This occurs because of a TOCTOU race condition associated with a VMCB12 double fetch in nested_svm_vmrun.

EPSS

Процентиль: 13%
0.00043
Низкий

7.4 High

CVSS3

6.9 Medium

CVSS2

Дефекты

CWE-367