Количество 68
Количество 68
ELSA-2021-9565
ELSA-2021-9565: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2021-9564
ELSA-2021-9564: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2021-9422
ELSA-2021-9422: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2021-9421
ELSA-2021-9421: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2021-9420
ELSA-2021-9420: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2021-9419
ELSA-2021-9419: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2021:3073-1
Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP3)
ELSA-2021-3801
ELSA-2021-3801: kernel security and bug fix update (IMPORTANT)
ELSA-2021-9451
ELSA-2021-9451: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2021-9450
ELSA-2021-9450: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2021:3969-1
Security update for the Linux Kernel

CVE-2021-3653
A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "int_ctl" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.

CVE-2021-3653
A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "int_ctl" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.

CVE-2021-3653
A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "int_ctl" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.

CVE-2021-3653
CVE-2021-3653
A flaw was found in the KVM's AMD code for supporting SVM nested virtu ...

SUSE-SU-2021:3972-1
Security update for the Linux Kernel

openSUSE-SU-2021:3876-1
Security update for the Linux Kernel

SUSE-SU-2021:3876-1
Security update for the Linux Kernel

ROS-20220207-01
Уязвимость ядра Linux
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2021-9565 ELSA-2021-9565: Unbreakable Enterprise kernel-container security update (IMPORTANT) | больше 3 лет назад | |||
ELSA-2021-9564 ELSA-2021-9564: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 3 лет назад | |||
ELSA-2021-9422 ELSA-2021-9422: Unbreakable Enterprise kernel-container security update (IMPORTANT) | почти 4 года назад | |||
ELSA-2021-9421 ELSA-2021-9421: Unbreakable Enterprise kernel-container security update (IMPORTANT) | почти 4 года назад | |||
ELSA-2021-9420 ELSA-2021-9420: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 4 года назад | |||
ELSA-2021-9419 ELSA-2021-9419: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 4 года назад | |||
![]() | SUSE-SU-2021:3073-1 Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP3) | почти 4 года назад | ||
ELSA-2021-3801 ELSA-2021-3801: kernel security and bug fix update (IMPORTANT) | больше 3 лет назад | |||
ELSA-2021-9451 ELSA-2021-9451: Unbreakable Enterprise kernel-container security update (IMPORTANT) | почти 4 года назад | |||
ELSA-2021-9450 ELSA-2021-9450: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 4 года назад | |||
![]() | SUSE-SU-2021:3969-1 Security update for the Linux Kernel | больше 3 лет назад | ||
![]() | CVE-2021-3653 A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "int_ctl" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7. | CVSS3: 8.8 | 0% Низкий | больше 3 лет назад |
![]() | CVE-2021-3653 A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "int_ctl" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7. | CVSS3: 8.8 | 0% Низкий | почти 4 года назад |
![]() | CVE-2021-3653 A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "int_ctl" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7. | CVSS3: 8.8 | 0% Низкий | больше 3 лет назад |
![]() | CVSS3: 8.8 | 0% Низкий | больше 3 лет назад | |
CVE-2021-3653 A flaw was found in the KVM's AMD code for supporting SVM nested virtu ... | CVSS3: 8.8 | 0% Низкий | больше 3 лет назад | |
![]() | SUSE-SU-2021:3972-1 Security update for the Linux Kernel | больше 3 лет назад | ||
![]() | openSUSE-SU-2021:3876-1 Security update for the Linux Kernel | больше 3 лет назад | ||
![]() | SUSE-SU-2021:3876-1 Security update for the Linux Kernel | больше 3 лет назад | ||
![]() | ROS-20220207-01 Уязвимость ядра Linux | больше 3 лет назад |
Уязвимостей на страницу