Количество 68
Количество 68

CVE-2021-3744
A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.

CVE-2021-3744
CVE-2021-3744
A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gc ...

CVE-2021-3656
A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.

CVE-2021-3656
A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.

CVE-2021-3656
A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.

CVE-2021-3656
CVE-2021-3656
A flaw was found in the KVM's AMD code for supporting SVM nested virtu ...

BDU:2021-04802
Уязвимость криптодрайвера ccp-ops ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

BDU:2022-00683
Уязвимость ядра операционной системы Linux, связанная с недостатками разграничения доступа, позволяющая нарушителю повысить свои привилегии

RLSA-2021:4088
Important: kernel-rt security and bug fix update
ELSA-2021-4056
ELSA-2021-4056: kernel security, bug fix, and enhancement update (IMPORTANT)

SUSE-SU-2021:14849-1
Security update for the Linux Kernel

SUSE-SU-2021:3389-1
Security update for the Linux Kernel

SUSE-SU-2021:3388-1
Security update for the Linux Kernel

SUSE-SU-2021:3386-1
Security update for the Linux Kernel

openSUSE-SU-2021:3447-1
Security update for the Linux Kernel

openSUSE-SU-2021:3338-1
Security update for the Linux Kernel

openSUSE-SU-2021:1365-1
Security update for the Linux Kernel

openSUSE-SU-2021:1357-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2021-3744 A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808. | CVSS3: 5.5 | 0% Низкий | больше 3 лет назад |
![]() | CVSS3: 5.5 | 0% Низкий | больше 3 лет назад | |
CVE-2021-3744 A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gc ... | CVSS3: 5.5 | 0% Низкий | больше 3 лет назад | |
![]() | CVE-2021-3656 A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. | CVSS3: 8.8 | 0% Низкий | больше 3 лет назад |
![]() | CVE-2021-3656 A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. | CVSS3: 8.8 | 0% Низкий | почти 4 года назад |
![]() | CVE-2021-3656 A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. | CVSS3: 8.8 | 0% Низкий | больше 3 лет назад |
![]() | CVSS3: 8.8 | 0% Низкий | больше 3 лет назад | |
CVE-2021-3656 A flaw was found in the KVM's AMD code for supporting SVM nested virtu ... | CVSS3: 8.8 | 0% Низкий | больше 3 лет назад | |
![]() | BDU:2021-04802 Уязвимость криптодрайвера ccp-ops ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | больше 3 лет назад |
![]() | BDU:2022-00683 Уязвимость ядра операционной системы Linux, связанная с недостатками разграничения доступа, позволяющая нарушителю повысить свои привилегии | CVSS3: 8.8 | 0% Низкий | почти 4 года назад |
![]() | RLSA-2021:4088 Important: kernel-rt security and bug fix update | больше 3 лет назад | ||
ELSA-2021-4056 ELSA-2021-4056: kernel security, bug fix, and enhancement update (IMPORTANT) | больше 3 лет назад | |||
![]() | SUSE-SU-2021:14849-1 Security update for the Linux Kernel | больше 3 лет назад | ||
![]() | SUSE-SU-2021:3389-1 Security update for the Linux Kernel | больше 3 лет назад | ||
![]() | SUSE-SU-2021:3388-1 Security update for the Linux Kernel | больше 3 лет назад | ||
![]() | SUSE-SU-2021:3386-1 Security update for the Linux Kernel | больше 3 лет назад | ||
![]() | openSUSE-SU-2021:3447-1 Security update for the Linux Kernel | больше 3 лет назад | ||
![]() | openSUSE-SU-2021:3338-1 Security update for the Linux Kernel | больше 3 лет назад | ||
![]() | openSUSE-SU-2021:1365-1 Security update for the Linux Kernel | больше 3 лет назад | ||
![]() | openSUSE-SU-2021:1357-1 Security update for the Linux Kernel | больше 3 лет назад |
Уязвимостей на страницу