Количество 81
Количество 81
CVE-2021-3656
A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.
CVE-2021-3656
A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.
CVE-2021-3656
A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.
CVE-2021-3656
A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result the L2 guest would be allowed to read/write physical pages of the host resulting in a crash of the entire system leak of sensitive data or potential guest-to-host escape.
CVE-2021-3656
A flaw was found in the KVM's AMD code for supporting SVM nested virtu ...
SUSE-SU-2021:2756-1
Security update for the Linux Kernel
SUSE-SU-2021:2646-1
Security update for the Linux Kernel
openSUSE-SU-2021:1142-1
Security update for the Linux Kernel
SUSE-SU-2021:2647-1
Security update for the Linux Kernel
SUSE-SU-2021:2644-1
Security update for the Linux Kernel
SUSE-SU-2021:3929-1
Security update for the Linux Kernel
SUSE-SU-2021:3935-1
Security update for the Linux Kernel
openSUSE-SU-2021:2687-1
Security update for the Linux Kernel
openSUSE-SU-2021:2645-1
Security update for the Linux Kernel
SUSE-SU-2021:2687-1
Security update for the Linux Kernel
SUSE-SU-2021:2645-1
Security update for the Linux Kernel
BDU:2022-00683
Уязвимость ядра операционной системы Linux, связанная с недостатками разграничения доступа, позволяющая нарушителю повысить свои привилегии
SUSE-SU-2021:2643-1
Security update for the Linux Kernel
CVE-2021-22543
An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.
CVE-2021-22543
An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2021-3656 A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. | CVSS3: 8.8 | 0% Низкий | больше 3 лет назад | |
CVE-2021-3656 A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. | CVSS3: 8.8 | 0% Низкий | около 4 лет назад | |
CVE-2021-3656 A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. | CVSS3: 8.8 | 0% Низкий | больше 3 лет назад | |
CVE-2021-3656 A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result the L2 guest would be allowed to read/write physical pages of the host resulting in a crash of the entire system leak of sensitive data or potential guest-to-host escape. | CVSS3: 8.8 | 0% Низкий | больше 3 лет назад | |
CVE-2021-3656 A flaw was found in the KVM's AMD code for supporting SVM nested virtu ... | CVSS3: 8.8 | 0% Низкий | больше 3 лет назад | |
SUSE-SU-2021:2756-1 Security update for the Linux Kernel | около 4 лет назад | |||
SUSE-SU-2021:2646-1 Security update for the Linux Kernel | больше 4 лет назад | |||
openSUSE-SU-2021:1142-1 Security update for the Linux Kernel | больше 4 лет назад | |||
SUSE-SU-2021:2647-1 Security update for the Linux Kernel | больше 4 лет назад | |||
SUSE-SU-2021:2644-1 Security update for the Linux Kernel | больше 4 лет назад | |||
SUSE-SU-2021:3929-1 Security update for the Linux Kernel | почти 4 года назад | |||
SUSE-SU-2021:3935-1 Security update for the Linux Kernel | почти 4 года назад | |||
openSUSE-SU-2021:2687-1 Security update for the Linux Kernel | больше 4 лет назад | |||
openSUSE-SU-2021:2645-1 Security update for the Linux Kernel | больше 4 лет назад | |||
SUSE-SU-2021:2687-1 Security update for the Linux Kernel | больше 4 лет назад | |||
SUSE-SU-2021:2645-1 Security update for the Linux Kernel | больше 4 лет назад | |||
BDU:2022-00683 Уязвимость ядра операционной системы Linux, связанная с недостатками разграничения доступа, позволяющая нарушителю повысить свои привилегии | CVSS3: 8.8 | 0% Низкий | больше 4 лет назад | |
SUSE-SU-2021:2643-1 Security update for the Linux Kernel | больше 4 лет назад | |||
CVE-2021-22543 An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation. | CVSS3: 7.8 | 0% Низкий | больше 4 лет назад | |
CVE-2021-22543 An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation. | CVSS3: 7 | 0% Низкий | больше 4 лет назад |
Уязвимостей на страницу