Логотип exploitDog
bind:"BDU:2022-00683" OR bind:"CVE-2021-3656"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2022-00683" OR bind:"CVE-2021-3656"

Количество 37

Количество 37

fstec логотип

BDU:2022-00683

больше 4 лет назад

Уязвимость ядра операционной системы Linux, связанная с недостатками разграничения доступа, позволяющая нарушителю повысить свои привилегии

CVSS3: 8.8
EPSS: Низкий
redos логотип

ROS-20220207-01

почти 4 года назад

Уязвимость ядра Linux

EPSS: Низкий
ubuntu логотип

CVE-2021-3656

больше 3 лет назад

A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.

CVSS3: 8.8
EPSS: Низкий
redhat логотип

CVE-2021-3656

около 4 лет назад

A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.

CVSS3: 8.8
EPSS: Низкий
nvd логотип

CVE-2021-3656

больше 3 лет назад

A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.

CVSS3: 8.8
EPSS: Низкий
msrc логотип

CVE-2021-3656

больше 3 лет назад

A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result the L2 guest would be allowed to read/write physical pages of the host resulting in a crash of the entire system leak of sensitive data or potential guest-to-host escape.

CVSS3: 8.8
EPSS: Низкий
debian логотип

CVE-2021-3656

больше 3 лет назад

A flaw was found in the KVM's AMD code for supporting SVM nested virtu ...

CVSS3: 8.8
EPSS: Низкий
oracle-oval логотип

ELSA-2021-9422

больше 4 лет назад

ELSA-2021-9422: Unbreakable Enterprise kernel-container security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9421

больше 4 лет назад

ELSA-2021-9421: Unbreakable Enterprise kernel-container security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9420

больше 4 лет назад

ELSA-2021-9420: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9419

больше 4 лет назад

ELSA-2021-9419: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:3073-1

около 4 лет назад

Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP3)

EPSS: Низкий
rocky логотип

RLSA-2021:4088

около 4 лет назад

Important: kernel-rt security and bug fix update

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9565

почти 4 года назад

ELSA-2021-9565: Unbreakable Enterprise kernel-container security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9564

почти 4 года назад

ELSA-2021-9564: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-4056

около 4 лет назад

ELSA-2021-4056: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-3801

около 4 лет назад

ELSA-2021-3801: kernel security and bug fix update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9451

около 4 лет назад

ELSA-2021-9451: Unbreakable Enterprise kernel-container security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9450

около 4 лет назад

ELSA-2021-9450: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-9245

больше 3 лет назад

ELSA-2022-9245: Unbreakable Enterprise kernel-container security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2022-00683

Уязвимость ядра операционной системы Linux, связанная с недостатками разграничения доступа, позволяющая нарушителю повысить свои привилегии

CVSS3: 8.8
0%
Низкий
больше 4 лет назад
redos логотип
ROS-20220207-01

Уязвимость ядра Linux

почти 4 года назад
ubuntu логотип
CVE-2021-3656

A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.

CVSS3: 8.8
0%
Низкий
больше 3 лет назад
redhat логотип
CVE-2021-3656

A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.

CVSS3: 8.8
0%
Низкий
около 4 лет назад
nvd логотип
CVE-2021-3656

A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.

CVSS3: 8.8
0%
Низкий
больше 3 лет назад
msrc логотип
CVE-2021-3656

A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result the L2 guest would be allowed to read/write physical pages of the host resulting in a crash of the entire system leak of sensitive data or potential guest-to-host escape.

CVSS3: 8.8
0%
Низкий
больше 3 лет назад
debian логотип
CVE-2021-3656

A flaw was found in the KVM's AMD code for supporting SVM nested virtu ...

CVSS3: 8.8
0%
Низкий
больше 3 лет назад
oracle-oval логотип
ELSA-2021-9422

ELSA-2021-9422: Unbreakable Enterprise kernel-container security update (IMPORTANT)

больше 4 лет назад
oracle-oval логотип
ELSA-2021-9421

ELSA-2021-9421: Unbreakable Enterprise kernel-container security update (IMPORTANT)

больше 4 лет назад
oracle-oval логотип
ELSA-2021-9420

ELSA-2021-9420: Unbreakable Enterprise kernel security update (IMPORTANT)

больше 4 лет назад
oracle-oval логотип
ELSA-2021-9419

ELSA-2021-9419: Unbreakable Enterprise kernel security update (IMPORTANT)

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:3073-1

Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP3)

около 4 лет назад
rocky логотип
RLSA-2021:4088

Important: kernel-rt security and bug fix update

около 4 лет назад
oracle-oval логотип
ELSA-2021-9565

ELSA-2021-9565: Unbreakable Enterprise kernel-container security update (IMPORTANT)

почти 4 года назад
oracle-oval логотип
ELSA-2021-9564

ELSA-2021-9564: Unbreakable Enterprise kernel security update (IMPORTANT)

почти 4 года назад
oracle-oval логотип
ELSA-2021-4056

ELSA-2021-4056: kernel security, bug fix, and enhancement update (IMPORTANT)

около 4 лет назад
oracle-oval логотип
ELSA-2021-3801

ELSA-2021-3801: kernel security and bug fix update (IMPORTANT)

около 4 лет назад
oracle-oval логотип
ELSA-2021-9451

ELSA-2021-9451: Unbreakable Enterprise kernel-container security update (IMPORTANT)

около 4 лет назад
oracle-oval логотип
ELSA-2021-9450

ELSA-2021-9450: Unbreakable Enterprise kernel security update (IMPORTANT)

около 4 лет назад
oracle-oval логотип
ELSA-2022-9245

ELSA-2022-9245: Unbreakable Enterprise kernel-container security update (IMPORTANT)

больше 3 лет назад

Уязвимостей на страницу