Логотип exploitDog
bind:"CVE-2021-3653" OR bind:"CVE-2021-3656"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2021-3653" OR bind:"CVE-2021-3656"

Количество 49

Количество 49

oracle-oval логотип

ELSA-2021-9422

почти 4 года назад

ELSA-2021-9422: Unbreakable Enterprise kernel-container security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9421

почти 4 года назад

ELSA-2021-9421: Unbreakable Enterprise kernel-container security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9420

почти 4 года назад

ELSA-2021-9420: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9419

почти 4 года назад

ELSA-2021-9419: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:3073-1

почти 4 года назад

Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP3)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9565

больше 3 лет назад

ELSA-2021-9565: Unbreakable Enterprise kernel-container security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9564

больше 3 лет назад

ELSA-2021-9564: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-3801

больше 3 лет назад

ELSA-2021-3801: kernel security and bug fix update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9451

почти 4 года назад

ELSA-2021-9451: Unbreakable Enterprise kernel-container security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9450

почти 4 года назад

ELSA-2021-9450: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
redos логотип

ROS-20220207-01

больше 3 лет назад

Уязвимость ядра Linux

EPSS: Низкий
oracle-oval логотип

ELSA-2022-9245

около 3 лет назад

ELSA-2022-9245: Unbreakable Enterprise kernel-container security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-9244

около 3 лет назад

ELSA-2022-9244: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9453

больше 3 лет назад

ELSA-2021-9453: Unbreakable Enterprise kernel-container security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9452

больше 3 лет назад

ELSA-2021-9452: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:3192-1

больше 3 лет назад

Security update for the Linux Kernel

EPSS: Низкий
ubuntu логотип

CVE-2021-3656

больше 3 лет назад

A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.

CVSS3: 8.8
EPSS: Низкий
redhat логотип

CVE-2021-3656

почти 4 года назад

A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.

CVSS3: 8.8
EPSS: Низкий
nvd логотип

CVE-2021-3656

больше 3 лет назад

A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.

CVSS3: 8.8
EPSS: Низкий
msrc логотип

CVE-2021-3656

больше 3 лет назад

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2021-9422

ELSA-2021-9422: Unbreakable Enterprise kernel-container security update (IMPORTANT)

почти 4 года назад
oracle-oval логотип
ELSA-2021-9421

ELSA-2021-9421: Unbreakable Enterprise kernel-container security update (IMPORTANT)

почти 4 года назад
oracle-oval логотип
ELSA-2021-9420

ELSA-2021-9420: Unbreakable Enterprise kernel security update (IMPORTANT)

почти 4 года назад
oracle-oval логотип
ELSA-2021-9419

ELSA-2021-9419: Unbreakable Enterprise kernel security update (IMPORTANT)

почти 4 года назад
suse-cvrf логотип
SUSE-SU-2021:3073-1

Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP3)

почти 4 года назад
oracle-oval логотип
ELSA-2021-9565

ELSA-2021-9565: Unbreakable Enterprise kernel-container security update (IMPORTANT)

больше 3 лет назад
oracle-oval логотип
ELSA-2021-9564

ELSA-2021-9564: Unbreakable Enterprise kernel security update (IMPORTANT)

больше 3 лет назад
oracle-oval логотип
ELSA-2021-3801

ELSA-2021-3801: kernel security and bug fix update (IMPORTANT)

больше 3 лет назад
oracle-oval логотип
ELSA-2021-9451

ELSA-2021-9451: Unbreakable Enterprise kernel-container security update (IMPORTANT)

почти 4 года назад
oracle-oval логотип
ELSA-2021-9450

ELSA-2021-9450: Unbreakable Enterprise kernel security update (IMPORTANT)

почти 4 года назад
redos логотип
ROS-20220207-01

Уязвимость ядра Linux

больше 3 лет назад
oracle-oval логотип
ELSA-2022-9245

ELSA-2022-9245: Unbreakable Enterprise kernel-container security update (IMPORTANT)

около 3 лет назад
oracle-oval логотип
ELSA-2022-9244

ELSA-2022-9244: Unbreakable Enterprise kernel security update (IMPORTANT)

около 3 лет назад
oracle-oval логотип
ELSA-2021-9453

ELSA-2021-9453: Unbreakable Enterprise kernel-container security update (IMPORTANT)

больше 3 лет назад
oracle-oval логотип
ELSA-2021-9452

ELSA-2021-9452: Unbreakable Enterprise kernel security update (IMPORTANT)

больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2021:3192-1

Security update for the Linux Kernel

больше 3 лет назад
ubuntu логотип
CVE-2021-3656

A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.

CVSS3: 8.8
0%
Низкий
больше 3 лет назад
redhat логотип
CVE-2021-3656

A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.

CVSS3: 8.8
0%
Низкий
почти 4 года назад
nvd логотип
CVE-2021-3656

A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.

CVSS3: 8.8
0%
Низкий
больше 3 лет назад
msrc логотип
CVSS3: 8.8
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу