Логотип exploitDog
bind:"CVE-2021-3656" OR bind:"CVE-2021-3653" OR bind:"CVE-2021-3744"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2021-3656" OR bind:"CVE-2021-3653" OR bind:"CVE-2021-3744"

Количество 68

Количество 68

rocky логотип

RLSA-2021:4088

больше 3 лет назад

Important: kernel-rt security and bug fix update

EPSS: Низкий
oracle-oval логотип

ELSA-2021-4056

больше 3 лет назад

ELSA-2021-4056: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2021-3653

больше 3 лет назад

A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "int_ctl" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.

CVSS3: 8.8
EPSS: Низкий
redhat логотип

CVE-2021-3653

почти 4 года назад

A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "int_ctl" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.

CVSS3: 8.8
EPSS: Низкий
nvd логотип

CVE-2021-3653

больше 3 лет назад

A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "int_ctl" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.

CVSS3: 8.8
EPSS: Низкий
msrc логотип

CVE-2021-3653

больше 3 лет назад

CVSS3: 8.8
EPSS: Низкий
debian логотип

CVE-2021-3653

больше 3 лет назад

A flaw was found in the KVM's AMD code for supporting SVM nested virtu ...

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2021-04802

больше 3 лет назад

Уязвимость криптодрайвера ccp-ops ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-g58x-c6rr-7fp2

около 3 лет назад

A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "int_ctl" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.

CVSS3: 8.8
EPSS: Низкий
oracle-oval логотип

ELSA-2021-3548

почти 4 года назад

ELSA-2021-3548: kernel security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2022-00682

почти 4 года назад

Уязвимость подсистемы виртуализации KVM ядра операционной системы Linux, связанная с недостатками разграничения доступа, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:3196-1

больше 3 лет назад

Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:3389-1

больше 3 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:3388-1

больше 3 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:3386-1

больше 3 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:3447-1

больше 3 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:3338-1

больше 3 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:1365-1

больше 3 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:1357-1

больше 3 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:3447-1

больше 3 лет назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
rocky логотип
RLSA-2021:4088

Important: kernel-rt security and bug fix update

больше 3 лет назад
oracle-oval логотип
ELSA-2021-4056

ELSA-2021-4056: kernel security, bug fix, and enhancement update (IMPORTANT)

больше 3 лет назад
ubuntu логотип
CVE-2021-3653

A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "int_ctl" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.

CVSS3: 8.8
0%
Низкий
больше 3 лет назад
redhat логотип
CVE-2021-3653

A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "int_ctl" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.

CVSS3: 8.8
0%
Низкий
почти 4 года назад
nvd логотип
CVE-2021-3653

A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "int_ctl" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.

CVSS3: 8.8
0%
Низкий
больше 3 лет назад
msrc логотип
CVSS3: 8.8
0%
Низкий
больше 3 лет назад
debian логотип
CVE-2021-3653

A flaw was found in the KVM's AMD code for supporting SVM nested virtu ...

CVSS3: 8.8
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2021-04802

Уязвимость криптодрайвера ccp-ops ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
0%
Низкий
больше 3 лет назад
github логотип
GHSA-g58x-c6rr-7fp2

A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "int_ctl" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.

CVSS3: 8.8
0%
Низкий
около 3 лет назад
oracle-oval логотип
ELSA-2021-3548

ELSA-2021-3548: kernel security, bug fix, and enhancement update (MODERATE)

почти 4 года назад
fstec логотип
BDU:2022-00682

Уязвимость подсистемы виртуализации KVM ядра операционной системы Linux, связанная с недостатками разграничения доступа, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.5
0%
Низкий
почти 4 года назад
suse-cvrf логотип
SUSE-SU-2021:3196-1

Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP3)

больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2021:3389-1

Security update for the Linux Kernel

больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2021:3388-1

Security update for the Linux Kernel

больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2021:3386-1

Security update for the Linux Kernel

больше 3 лет назад
suse-cvrf логотип
openSUSE-SU-2021:3447-1

Security update for the Linux Kernel

больше 3 лет назад
suse-cvrf логотип
openSUSE-SU-2021:3338-1

Security update for the Linux Kernel

больше 3 лет назад
suse-cvrf логотип
openSUSE-SU-2021:1365-1

Security update for the Linux Kernel

больше 3 лет назад
suse-cvrf логотип
openSUSE-SU-2021:1357-1

Security update for the Linux Kernel

больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2021:3447-1

Security update for the Linux Kernel

больше 3 лет назад

Уязвимостей на страницу