Количество 37
Количество 37

BDU:2022-00683
Уязвимость ядра операционной системы Linux, связанная с недостатками разграничения доступа, позволяющая нарушителю повысить свои привилегии

ROS-20220207-01
Уязвимость ядра Linux

CVE-2021-3656
A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.

CVE-2021-3656
A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.

CVE-2021-3656
A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.

CVE-2021-3656
CVE-2021-3656
A flaw was found in the KVM's AMD code for supporting SVM nested virtu ...
ELSA-2021-9422
ELSA-2021-9422: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2021-9421
ELSA-2021-9421: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2021-9420
ELSA-2021-9420: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2021-9419
ELSA-2021-9419: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2021:3073-1
Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP3)

RLSA-2021:4088
Important: kernel-rt security and bug fix update
ELSA-2021-9565
ELSA-2021-9565: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2021-9564
ELSA-2021-9564: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2021-4056
ELSA-2021-4056: kernel security, bug fix, and enhancement update (IMPORTANT)
ELSA-2021-3801
ELSA-2021-3801: kernel security and bug fix update (IMPORTANT)
ELSA-2021-9451
ELSA-2021-9451: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2021-9450
ELSA-2021-9450: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2022-9245
ELSA-2022-9245: Unbreakable Enterprise kernel-container security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2022-00683 Уязвимость ядра операционной системы Linux, связанная с недостатками разграничения доступа, позволяющая нарушителю повысить свои привилегии | CVSS3: 8.8 | 0% Низкий | почти 4 года назад |
![]() | ROS-20220207-01 Уязвимость ядра Linux | больше 3 лет назад | ||
![]() | CVE-2021-3656 A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. | CVSS3: 8.8 | 0% Низкий | больше 3 лет назад |
![]() | CVE-2021-3656 A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. | CVSS3: 8.8 | 0% Низкий | почти 4 года назад |
![]() | CVE-2021-3656 A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. | CVSS3: 8.8 | 0% Низкий | больше 3 лет назад |
![]() | CVSS3: 8.8 | 0% Низкий | больше 3 лет назад | |
CVE-2021-3656 A flaw was found in the KVM's AMD code for supporting SVM nested virtu ... | CVSS3: 8.8 | 0% Низкий | больше 3 лет назад | |
ELSA-2021-9422 ELSA-2021-9422: Unbreakable Enterprise kernel-container security update (IMPORTANT) | почти 4 года назад | |||
ELSA-2021-9421 ELSA-2021-9421: Unbreakable Enterprise kernel-container security update (IMPORTANT) | почти 4 года назад | |||
ELSA-2021-9420 ELSA-2021-9420: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 4 года назад | |||
ELSA-2021-9419 ELSA-2021-9419: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 4 года назад | |||
![]() | SUSE-SU-2021:3073-1 Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP3) | почти 4 года назад | ||
![]() | RLSA-2021:4088 Important: kernel-rt security and bug fix update | больше 3 лет назад | ||
ELSA-2021-9565 ELSA-2021-9565: Unbreakable Enterprise kernel-container security update (IMPORTANT) | больше 3 лет назад | |||
ELSA-2021-9564 ELSA-2021-9564: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 3 лет назад | |||
ELSA-2021-4056 ELSA-2021-4056: kernel security, bug fix, and enhancement update (IMPORTANT) | больше 3 лет назад | |||
ELSA-2021-3801 ELSA-2021-3801: kernel security and bug fix update (IMPORTANT) | больше 3 лет назад | |||
ELSA-2021-9451 ELSA-2021-9451: Unbreakable Enterprise kernel-container security update (IMPORTANT) | почти 4 года назад | |||
ELSA-2021-9450 ELSA-2021-9450: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 4 года назад | |||
ELSA-2022-9245 ELSA-2022-9245: Unbreakable Enterprise kernel-container security update (IMPORTANT) | около 3 лет назад |
Уязвимостей на страницу