Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-3653
HistoryAug 16, 2021 - 12:00 a.m.

CVE-2021-3653

2021-08-1600:00:00
ubuntu.com
ubuntu.com
24

6.1 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:P/I:P/A:C

8.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

23.7%

A flaw was found in the KVM’s AMD code for supporting SVM nested
virtualization. The flaw occurs when processing the VMCB (virtual machine
control block) provided by the L1 guest to spawn/handle a nested guest
(L2). Due to improper validation of the “int_ctl” field, this issue could
allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt
Controller) for the L2 guest. As a result, the L2 guest would be allowed to
read/write physical pages of the host, resulting in a crash of the entire
system, leak of sensitive data or potential guest-to-host escape. This flaw
affects Linux kernel versions prior to 5.14-rc7.

Notes

Author Note
cascardo trusty libvirt/qemu does not create nested capable VMs by default
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchlinux< 4.15.0-156.163UNKNOWN
ubuntu20.04noarchlinux< 5.4.0-84.94UNKNOWN
ubuntu21.04noarchlinux< 5.11.0-34.36UNKNOWN
ubuntu16.04noarchlinux< 4.4.0-214.246UNKNOWN
ubuntu18.04noarchlinux-aws< 4.15.0-1111.118UNKNOWN
ubuntu20.04noarchlinux-aws< 5.4.0-1056.59UNKNOWN
ubuntu21.04noarchlinux-aws< 5.11.0-1017.18UNKNOWN
ubuntu14.04noarchlinux-aws< 4.4.0-1096.101UNKNOWN
ubuntu16.04noarchlinux-aws< 4.4.0-1132.146UNKNOWN
ubuntu20.04noarchlinux-aws-5.11< 5.11.0-1017.18~20.04.1UNKNOWN
Rows per page:
1-10 of 591

6.1 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:P/I:P/A:C

8.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

23.7%