CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
35.2%
Maxim Levitsky and Paolo Bonzini discovered that the KVM hypervisor
implementation for AMD processors in the Linux kernel allowed a guest VM to
disable restrictions on VMLOAD/VMSAVE in a nested guest. An attacker in a
guest VM could use this to read or write portions of the host’s physical
memory. (CVE-2021-3656)
Maxim Levitsky discovered that the KVM hypervisor implementation for AMD
processors in the Linux kernel did not properly prevent a guest VM from
enabling AVIC in nested guest VMs. An attacker in a guest VM could use this
to write to portions of the host’s physical memory. (CVE-2021-3653)
Norbert Slusarek discovered that the CAN broadcast manger (bcm) protocol
implementation in the Linux kernel did not properly initialize memory in
some situations. A local attacker could use this to expose sensitive
information (kernel memory). (CVE-2021-34693)
Murray McAllister discovered that the joystick device interface in the
Linux kernel did not properly validate data passed via an ioctl(). A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code on systems with a joystick device
registered. (CVE-2021-3612)
It was discovered that the Virtio console implementation in the Linux
kernel did not properly validate input lengths in some situations. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2021-38160)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 18.04 | noarch | linux-image-4.15.0-1108-gcp | < 4.15.0-1108.122 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-image-4.15.0-1108-gcp-dbgsym | < 4.15.0-1108.122 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-image-gcp-lts-18.04 | < 4.15.0.1108.127 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-gcp-lts-18.04 | < 4.15.0.1108.127 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-headers-gcp-lts-18.04 | < 4.15.0.1108.127 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-modules-extra-gcp-lts-18.04 | < 4.15.0.1108.127 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-tools-gcp-lts-18.04 | < 4.15.0.1108.127 | UNKNOWN |
Ubuntu | 16.04 | noarch | linux-image-4.15.0-1108-gcp | < 4.15.0-1108.122~16.04.1 | UNKNOWN |
Ubuntu | 16.04 | noarch | linux-image-4.15.0-1098-gcp | < 4.15.0-1098.111~16.04.1 | UNKNOWN |
Ubuntu | 16.04 | noarch | linux-image-4.15.0-1098-gcp-dbgsym | < 4.15.0-1098.111~16.04.1 | UNKNOWN |
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
35.2%