Количество 80
Количество 80

CVE-2021-3656
A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.

CVE-2021-3656
A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.

CVE-2021-3656
A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.

CVE-2021-3656
CVE-2021-3656
A flaw was found in the KVM's AMD code for supporting SVM nested virtu ...

SUSE-SU-2021:2756-1
Security update for the Linux Kernel

SUSE-SU-2021:2646-1
Security update for the Linux Kernel

openSUSE-SU-2021:1142-1
Security update for the Linux Kernel

SUSE-SU-2021:2647-1
Security update for the Linux Kernel

SUSE-SU-2021:2644-1
Security update for the Linux Kernel

SUSE-SU-2021:3929-1
Security update for the Linux Kernel

SUSE-SU-2021:3935-1
Security update for the Linux Kernel

openSUSE-SU-2021:2687-1
Security update for the Linux Kernel

openSUSE-SU-2021:2645-1
Security update for the Linux Kernel

SUSE-SU-2021:2687-1
Security update for the Linux Kernel

SUSE-SU-2021:2645-1
Security update for the Linux Kernel

BDU:2022-00683
Уязвимость ядра операционной системы Linux, связанная с недостатками разграничения доступа, позволяющая нарушителю повысить свои привилегии

SUSE-SU-2021:2643-1
Security update for the Linux Kernel

CVE-2021-22543
An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.

CVE-2021-22543
An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2021-3656 A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. | CVSS3: 8.8 | 0% Низкий | больше 3 лет назад |
![]() | CVE-2021-3656 A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. | CVSS3: 8.8 | 0% Низкий | почти 4 года назад |
![]() | CVE-2021-3656 A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. | CVSS3: 8.8 | 0% Низкий | больше 3 лет назад |
![]() | CVSS3: 8.8 | 0% Низкий | больше 3 лет назад | |
CVE-2021-3656 A flaw was found in the KVM's AMD code for supporting SVM nested virtu ... | CVSS3: 8.8 | 0% Низкий | больше 3 лет назад | |
![]() | SUSE-SU-2021:2756-1 Security update for the Linux Kernel | почти 4 года назад | ||
![]() | SUSE-SU-2021:2646-1 Security update for the Linux Kernel | почти 4 года назад | ||
![]() | openSUSE-SU-2021:1142-1 Security update for the Linux Kernel | почти 4 года назад | ||
![]() | SUSE-SU-2021:2647-1 Security update for the Linux Kernel | почти 4 года назад | ||
![]() | SUSE-SU-2021:2644-1 Security update for the Linux Kernel | почти 4 года назад | ||
![]() | SUSE-SU-2021:3929-1 Security update for the Linux Kernel | больше 3 лет назад | ||
![]() | SUSE-SU-2021:3935-1 Security update for the Linux Kernel | больше 3 лет назад | ||
![]() | openSUSE-SU-2021:2687-1 Security update for the Linux Kernel | почти 4 года назад | ||
![]() | openSUSE-SU-2021:2645-1 Security update for the Linux Kernel | почти 4 года назад | ||
![]() | SUSE-SU-2021:2687-1 Security update for the Linux Kernel | почти 4 года назад | ||
![]() | SUSE-SU-2021:2645-1 Security update for the Linux Kernel | почти 4 года назад | ||
![]() | BDU:2022-00683 Уязвимость ядра операционной системы Linux, связанная с недостатками разграничения доступа, позволяющая нарушителю повысить свои привилегии | CVSS3: 8.8 | 0% Низкий | почти 4 года назад |
![]() | SUSE-SU-2021:2643-1 Security update for the Linux Kernel | почти 4 года назад | ||
![]() | CVE-2021-22543 An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation. | CVSS3: 7.8 | 0% Низкий | около 4 лет назад |
![]() | CVE-2021-22543 An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation. | CVSS3: 7 | 0% Низкий | около 4 лет назад |
Уязвимостей на страницу