First published: Wed Sep 08 2021(Updated: )
Maxim Levitsky and Paolo Bonzini discovered that the KVM hypervisor implementation for AMD processors in the Linux kernel allowed a guest VM to disable restrictions on VMLOAD/VMSAVE in a nested guest. An attacker in a guest VM could use this to read or write portions of the host's physical memory. (CVE-2021-3656) Maxim Levitsky discovered that the KVM hypervisor implementation for AMD processors in the Linux kernel did not properly prevent a guest VM from enabling AVIC in nested guest VMs. An attacker in a guest VM could use this to write to portions of the host's physical memory. (CVE-2021-3653) It was discovered that the KVM hypervisor implementation for AMD processors in the Linux kernel did not ensure enough processing time was given to perform cleanups of large SEV VMs. A local attacker could use this to cause a denial of service (soft lockup). (CVE-2020-36311) It was discovered that the KVM hypervisor implementation in the Linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability. An attacker who could start and control a VM could possibly use this to expose sensitive information or execute arbitrary code. (CVE-2021-22543) Murray McAllister discovered that the joystick device interface in the Linux kernel did not properly validate data passed via an ioctl(). A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code on systems with a joystick device registered. (CVE-2021-3612)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-5.4.0-1052-gke | <5.4.0-1052.55 | 5.4.0-1052.55 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-84-generic-lpae | <5.4.0-84.94 | 5.4.0-84.94 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1052-gcp | <5.4.0-1052.56 | 5.4.0-1052.56 |
=20.04 | ||
All of | ||
ubuntu/linux-image-gkeop | <5.4.0.1023.26 | 5.4.0.1023.26 |
=20.04 | ||
All of | ||
ubuntu/linux-image-virtual | <5.4.0.84.88 | 5.4.0.84.88 |
=20.04 | ||
All of | ||
ubuntu/linux-image-generic | <5.4.0.84.88 | 5.4.0.84.88 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-84-generic | <5.4.0-84.94 | 5.4.0-84.94 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1023-gkeop | <5.4.0-1023.24 | 5.4.0-1023.24 |
=20.04 | ||
All of | ||
ubuntu/linux-image-oem-osp1 | <5.4.0.84.88 | 5.4.0.84.88 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1046-kvm | <5.4.0-1046.48 | 5.4.0-1046.48 |
=20.04 | ||
All of | ||
ubuntu/linux-image-azure-lts-20.04 | <5.4.0.1058.56 | 5.4.0.1058.56 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1058-azure | <5.4.0-1058.60 | 5.4.0-1058.60 |
=20.04 | ||
All of | ||
ubuntu/linux-image-gkeop-5.4 | <5.4.0.1023.26 | 5.4.0.1023.26 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1054-oracle | <5.4.0-1054.58 | 5.4.0-1054.58 |
=20.04 | ||
All of | ||
ubuntu/linux-image-gcp-lts-20.04 | <5.4.0.1052.62 | 5.4.0.1052.62 |
=20.04 | ||
All of | ||
ubuntu/linux-image-aws-lts-20.04 | <5.4.0.1056.59 | 5.4.0.1056.59 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1056-aws | <5.4.0-1056.59 | 5.4.0-1056.59 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-84-lowlatency | <5.4.0-84.94 | 5.4.0-84.94 |
=20.04 | ||
All of | ||
ubuntu/linux-image-gke | <5.4.0.1052.62 | 5.4.0.1052.62 |
=20.04 | ||
All of | ||
ubuntu/linux-image-oracle-lts-20.04 | <5.4.0.1054.54 | 5.4.0.1054.54 |
=20.04 | ||
All of | ||
ubuntu/linux-image-gke-5.4 | <5.4.0.1052.62 | 5.4.0.1052.62 |
=20.04 | ||
All of | ||
ubuntu/linux-image-kvm | <5.4.0.1046.45 | 5.4.0.1046.45 |
=20.04 | ||
All of | ||
ubuntu/linux-image-oem | <5.4.0.84.88 | 5.4.0.84.88 |
=20.04 | ||
All of | ||
ubuntu/linux-image-generic-lpae | <5.4.0.84.88 | 5.4.0.84.88 |
=20.04 | ||
All of | ||
ubuntu/linux-image-lowlatency | <5.4.0.84.88 | 5.4.0.84.88 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1052-gke | <5.4.0-1052.55~18.04.1 | 5.4.0-1052.55~18.04.1 |
=18.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1052-gcp | <5.4.0-1052.56~18.04.1 | 5.4.0-1052.56~18.04.1 |
=18.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1023-gkeop | <5.4.0-1023.24~18.04.1 | 5.4.0-1023.24~18.04.1 |
=18.04 | ||
All of | ||
ubuntu/linux-image-aws | <5.4.0.1056.39 | 5.4.0.1056.39 |
=18.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1058-azure | <5.4.0-1058.60~18.04.1 | 5.4.0-1058.60~18.04.1 |
=18.04 | ||
All of | ||
ubuntu/linux-image-gkeop-5.4 | <5.4.0.1023.24~18.04.24 | 5.4.0.1023.24~18.04.24 |
=18.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1054-oracle | <5.4.0-1054.58~18.04.1 | 5.4.0-1054.58~18.04.1 |
=18.04 | ||
All of | ||
ubuntu/linux-image-azure | <5.4.0.1058.38 | 5.4.0.1058.38 |
=18.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1056-aws | <5.4.0-1056.59~18.04.1 | 5.4.0-1056.59~18.04.1 |
=18.04 | ||
All of | ||
ubuntu/linux-image-gcp | <5.4.0.1052.38 | 5.4.0.1052.38 |
=18.04 | ||
All of | ||
ubuntu/linux-image-oracle | <5.4.0.1054.58~18.04.34 | 5.4.0.1054.58~18.04.34 |
=18.04 | ||
All of | ||
ubuntu/linux-image-gke-5.4 | <5.4.0.1052.55~18.04.17 | 5.4.0.1052.55~18.04.17 |
=18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)