Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-29657
HistoryApr 03, 2021 - 12:00 a.m.

CVE-2021-29657

2021-04-0300:00:00
ubuntu.com
ubuntu.com
24
linux kernel
vulnerability
amd kvm
access control
host os
toctou race condition

CVSS2

6.9

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

CVSS3

7.4

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

68.3%

arch/x86/kvm/svm/nested.c in the Linux kernel before 5.11.12 has a
use-after-free in which an AMD KVM guest can bypass access control on host
OS MSRs when there are nested guests, aka CID-a58d9166a756. This occurs
because of a TOCTOU race condition associated with a VMCB12 double fetch in
nested_svm_vmrun.

OSVersionArchitecturePackageVersionFilename
ubuntu20.04noarchlinux-oem-5.10< 5.10.0-1025.26UNKNOWN

CVSS2

6.9

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

CVSS3

7.4

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

68.3%