Search CVE reports
11 – 20 of 34 results
Improper access control in secure encrypted virtualization (SEV) could allow a privileged attacker to write to the reverse map page (RMP) during secure nested paging (SNP) initialization, potentially resulting in a loss of guest...
1 affected package
amd64-microcode
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| amd64-microcode | Needs evaluation | Not affected | Not affected | Not affected |
A use after free in the SEV firmware could allow a malicous hypervisor to activate a migrated guest with the SINGLE_SOCKET policy on a different socket than the migration agent potentially resulting in loss of integrity.
1 affected package
amd64-microcode
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| amd64-microcode | Needs evaluation | Not affected | Not affected | Not affected |
Improper handling of overlap between the segmented reverse map table (RMP) and system management mode (SMM) memory could allow a privileged attacker corrupt or partially infer SMM memory resulting in loss of integrity or confidentiality.
1 affected package
amd64-microcode
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| amd64-microcode | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
Improper input validation in IOMMU could allow a malicious hypervisor to reconfigure IOMMU registers resulting in loss of guest data integrity.
1 affected package
amd64-microcode
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| amd64-microcode | Needs evaluation | Not affected | Not affected | Not affected |
Write what were condition within AMD CPUs may allow an admin-privileged attacker to modify the configuration of the CPU pipeline potentially resulting in the corruption of the stack pointer inside an SEV-SNP guest.
1 affected package
amd64-microcode
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| amd64-microcode | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
Some fixes available 16 of 164
Improper handling of insufficient entropy in the AMD CPUs could allow a local attacker to influence the values returned by the RDSEED instruction, potentially resulting in the consumption of insufficiently random values.
158 affected packages
amd64-microcode, linux, linux-hwe, linux-hwe-5.4, linux-hwe-5.8...
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| amd64-microcode | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
| linux | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
| linux-hwe | Not in release | Not in release | Not in release | Ignored |
| linux-hwe-5.4 | Not in release | Not in release | Not in release | Vulnerable |
| linux-hwe-5.8 | Not in release | Not in release | Ignored | Not in release |
| linux-hwe-5.11 | Not in release | Not in release | Ignored | Not in release |
| linux-hwe-5.13 | Not in release | Not in release | Ignored | Not in release |
| linux-hwe-5.15 | Not in release | Not in release | Vulnerable | Not in release |
| linux-hwe-5.19 | Not in release | Ignored | Not in release | Not in release |
| linux-hwe-6.2 | Not in release | Ignored | Not in release | Not in release |
| linux-hwe-6.5 | Not in release | Ignored | Not in release | Not in release |
| linux-hwe-6.8 | Not in release | Vulnerable | Not in release | Not in release |
| linux-hwe-6.11 | Ignored | Not in release | Not in release | Not in release |
| linux-hwe-6.14 | Ignored | Not in release | Not in release | Not in release |
| linux-hwe-edge | Not in release | Not in release | Not in release | Ignored |
| linux-lts-xenial | Not in release | Not in release | Not in release | Not in release |
| linux-kvm | Not in release | Vulnerable | Vulnerable | Vulnerable |
| linux-allwinner-5.19 | Not in release | Ignored | Not in release | Not in release |
| linux-aws | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
| linux-aws-5.0 | Not in release | Not in release | Not in release | Ignored |
| linux-aws-5.3 | Not in release | Not in release | Not in release | Ignored |
| linux-aws-5.4 | Not in release | Not in release | Not in release | Vulnerable |
| linux-aws-5.8 | Not in release | Not in release | Ignored | Not in release |
| linux-aws-5.11 | Not in release | Not in release | Ignored | Not in release |
| linux-aws-5.13 | Not in release | Not in release | Ignored | Not in release |
| linux-aws-5.15 | Not in release | Not in release | Vulnerable | Not in release |
| linux-aws-5.19 | Not in release | Ignored | Not in release | Not in release |
| linux-aws-6.2 | Not in release | Ignored | Not in release | Not in release |
| linux-aws-6.5 | Not in release | Ignored | Not in release | Not in release |
| linux-aws-6.8 | Not in release | Vulnerable | Not in release | Not in release |
| linux-aws-6.14 | Ignored | Not in release | Not in release | Not in release |
| linux-aws-hwe | Not in release | Not in release | Not in release | Not in release |
| linux-azure | Vulnerable | Vulnerable | Vulnerable | Ignored |
| linux-azure-4.15 | Not in release | Not in release | Not in release | Vulnerable |
| linux-azure-5.3 | Not in release | Not in release | Not in release | Ignored |
| linux-azure-5.4 | Not in release | Not in release | Not in release | Vulnerable |
| linux-azure-5.8 | Not in release | Not in release | Ignored | Not in release |
| linux-azure-5.11 | Not in release | Not in release | Ignored | Not in release |
| linux-azure-5.13 | Not in release | Not in release | Ignored | Not in release |
| linux-azure-5.15 | Not in release | Not in release | Vulnerable | Not in release |
| linux-azure-5.19 | Not in release | Ignored | Not in release | Not in release |
| linux-azure-6.2 | Not in release | Ignored | Not in release | Not in release |
| linux-azure-6.5 | Not in release | Ignored | Not in release | Not in release |
| linux-azure-6.8 | Not in release | Vulnerable | Not in release | Not in release |
| linux-azure-6.11 | Ignored | Not in release | Not in release | Not in release |
| linux-azure-6.14 | Vulnerable | Not in release | Not in release | Not in release |
| linux-azure-fde | Vulnerable | Vulnerable | Ignored | Not in release |
| linux-azure-fde-5.15 | Not in release | Not in release | Vulnerable | Not in release |
| linux-azure-fde-5.19 | Not in release | Ignored | Not in release | Not in release |
| linux-azure-fde-6.2 | Not in release | Ignored | Not in release | Not in release |
| linux-azure-fde-6.8 | Not in release | Vulnerable | Not in release | Not in release |
| linux-azure-fde-6.14 | Vulnerable | Not in release | Not in release | Not in release |
| linux-azure-nvidia | Vulnerable | Not in release | Not in release | Not in release |
| linux-azure-nvidia-6.14 | Vulnerable | Not in release | Not in release | Not in release |
| linux-bluefield | Not in release | Not in release | Vulnerable | Not in release |
| linux-azure-edge | Not in release | Not in release | Not in release | Ignored |
| linux-fips | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
| linux-aws-fips | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
| linux-azure-fips | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
| linux-gcp-fips | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
| linux-gcp | Vulnerable | Vulnerable | Vulnerable | Ignored |
| linux-gcp-4.15 | Not in release | Not in release | Not in release | Vulnerable |
| linux-gcp-5.3 | Not in release | Not in release | Not in release | Ignored |
| linux-gcp-5.4 | Not in release | Not in release | Not in release | Vulnerable |
| linux-gcp-5.8 | Not in release | Not in release | Ignored | Not in release |
| linux-gcp-5.11 | Not in release | Not in release | Ignored | Not in release |
| linux-gcp-5.13 | Not in release | Not in release | Ignored | Not in release |
| linux-gcp-5.15 | Not in release | Not in release | Vulnerable | Not in release |
| linux-gcp-5.19 | Not in release | Ignored | Not in release | Not in release |
| linux-gcp-6.2 | Not in release | Ignored | Not in release | Not in release |
| linux-gcp-6.5 | Not in release | Ignored | Not in release | Not in release |
| linux-gcp-6.8 | Not in release | Vulnerable | Not in release | Not in release |
| linux-gcp-6.11 | Ignored | Not in release | Not in release | Not in release |
| linux-gcp-6.14 | Ignored | Not in release | Not in release | Not in release |
| linux-gke | Vulnerable | Vulnerable | Ignored | Not in release |
| linux-gke-4.15 | Not in release | Not in release | Not in release | Ignored |
| linux-gke-5.4 | Not in release | Not in release | Not in release | Ignored |
| linux-gke-5.15 | Not in release | Not in release | Ignored | Not in release |
| linux-gkeop | Vulnerable | Vulnerable | Ignored | Not in release |
| linux-gkeop-5.4 | Not in release | Not in release | Not in release | Ignored |
| linux-gkeop-5.15 | Not in release | Not in release | Ignored | Not in release |
| linux-ibm | Vulnerable | Vulnerable | Vulnerable | Not in release |
| linux-ibm-5.4 | Not in release | Not in release | Not in release | Vulnerable |
| linux-ibm-5.15 | Not in release | Not in release | Vulnerable | Not in release |
| linux-ibm-6.8 | Not in release | Vulnerable | Not in release | Not in release |
| linux-intel-5.13 | Not in release | Not in release | Ignored | Not in release |
| linux-intel-iotg | Not in release | Vulnerable | Not in release | Not in release |
| linux-intel-iotg-5.15 | Not in release | Not in release | Vulnerable | Not in release |
| linux-iot | Not in release | Not in release | Vulnerable | Not in release |
| linux-intel-iot-realtime | Not in release | Vulnerable | Not in release | Not in release |
| linux-lowlatency | Vulnerable | Vulnerable | Not in release | Not in release |
| linux-lowlatency-hwe-5.15 | Not in release | Not in release | Vulnerable | Not in release |
| linux-lowlatency-hwe-5.19 | Not in release | Ignored | Not in release | Not in release |
| linux-lowlatency-hwe-6.2 | Not in release | Ignored | Not in release | Not in release |
| linux-lowlatency-hwe-6.5 | Not in release | Ignored | Not in release | Not in release |
| linux-lowlatency-hwe-6.8 | Not in release | Vulnerable | Not in release | Not in release |
| linux-lowlatency-hwe-6.11 | Ignored | Not in release | Not in release | Not in release |
| linux-nvidia | Vulnerable | Vulnerable | Not in release | Not in release |
| linux-nvidia-6.2 | Not in release | Ignored | Not in release | Not in release |
| linux-nvidia-6.5 | Not in release | Ignored | Not in release | Not in release |
| linux-nvidia-6.8 | Not in release | Vulnerable | Not in release | Not in release |
| linux-nvidia-6.11 | Ignored | Not in release | Not in release | Not in release |
| linux-nvidia-lowlatency | Vulnerable | Not in release | Not in release | Not in release |
| linux-nvidia-tegra | Vulnerable | Vulnerable | Not in release | Not in release |
| linux-nvidia-tegra-5.15 | Not in release | Not in release | Vulnerable | Not in release |
| linux-nvidia-tegra-igx | Not in release | Vulnerable | Not in release | Not in release |
| linux-oracle | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
| linux-oracle-5.0 | Not in release | Not in release | Not in release | Ignored |
| linux-oracle-5.3 | Not in release | Not in release | Not in release | Ignored |
| linux-oracle-5.4 | Not in release | Not in release | Not in release | Vulnerable |
| linux-oracle-5.8 | Not in release | Not in release | Ignored | Not in release |
| linux-oracle-5.11 | Not in release | Not in release | Ignored | Not in release |
| linux-oracle-5.13 | Not in release | Not in release | Ignored | Not in release |
| linux-oracle-5.15 | Not in release | Not in release | Vulnerable | Not in release |
| linux-oracle-6.5 | Not in release | Ignored | Not in release | Not in release |
| linux-oracle-6.8 | Not in release | Vulnerable | Not in release | Not in release |
| linux-oracle-6.14 | Ignored | Not in release | Not in release | Not in release |
| linux-oem | Not in release | Not in release | Not in release | Ignored |
| linux-oem-5.6 | Not in release | Not in release | Ignored | Not in release |
| linux-oem-5.10 | Not in release | Not in release | Ignored | Not in release |
| linux-oem-5.13 | Not in release | Not in release | Ignored | Not in release |
| linux-oem-5.14 | Not in release | Not in release | Ignored | Not in release |
| linux-oem-5.17 | Not in release | Ignored | Not in release | Not in release |
| linux-oem-6.0 | Not in release | Ignored | Not in release | Not in release |
| linux-oem-6.1 | Not in release | Ignored | Not in release | Not in release |
| linux-oem-6.5 | Not in release | Ignored | Not in release | Not in release |
| linux-oem-6.8 | Ignored | Not in release | Not in release | Not in release |
| linux-oem-6.11 | Ignored | Not in release | Not in release | Not in release |
| linux-oem-6.14 | Ignored | Not in release | Not in release | Not in release |
| linux-oem-6.17 | Fixed | Not in release | Not in release | Not in release |
| linux-raspi | Vulnerable | Vulnerable | Vulnerable | Not in release |
| linux-raspi2 | Not in release | Not in release | Ignored | Ignored |
| linux-raspi-5.4 | Not in release | Not in release | Not in release | Vulnerable |
| linux-raspi-realtime | Vulnerable | Not in release | Not in release | Not in release |
| linux-realtime | Vulnerable | Vulnerable | Not in release | Not in release |
| linux-realtime-6.8 | Not in release | Vulnerable | Not in release | Not in release |
| linux-realtime-6.14 | Ignored | Not in release | Not in release | Not in release |
| linux-riscv | Ignored | Ignored | Ignored | Not in release |
| linux-riscv-5.8 | Not in release | Not in release | Ignored | Not in release |
| linux-riscv-5.11 | Not in release | Not in release | Ignored | Not in release |
| linux-riscv-5.15 | Not in release | Not in release | Vulnerable | Not in release |
| linux-riscv-5.19 | Not in release | Ignored | Not in release | Not in release |
| linux-riscv-6.5 | Not in release | Ignored | Not in release | Not in release |
| linux-riscv-6.8 | Not in release | Vulnerable | Not in release | Not in release |
| linux-riscv-6.14 | Ignored | Not in release | Not in release | Not in release |
| linux-starfive-5.19 | Not in release | Ignored | Not in release | Not in release |
| linux-starfive-6.2 | Not in release | Ignored | Not in release | Not in release |
| linux-starfive-6.5 | Not in release | Ignored | Not in release | Not in release |
| linux-xilinx | Vulnerable | Not in release | Not in release | Not in release |
| linux-xilinx-zynqmp | Not in release | Vulnerable | Vulnerable | Not in release |
| linux-aws-6.17 | Fixed | Not in release | Not in release | Not in release |
| linux-gcp-6.17 | Fixed | Not in release | Not in release | Not in release |
| linux-hwe-6.17 | Fixed | Not in release | Not in release | Not in release |
| linux-oracle-6.17 | Fixed | Not in release | Not in release | Not in release |
| linux-riscv-6.17 | Fixed | Not in release | Not in release | Not in release |
| linux-azure-6.17 | Fixed | Not in release | Not in release | Not in release |
| linux-azure-fde-6.17 | Vulnerable | Not in release | Not in release | Not in release |
| linux-realtime-6.17 | Fixed | Not in release | Not in release | Not in release |
A bug within some AMD CPUs could allow a local admin-privileged attacker to run a SEV-SNP guest using stale TLB entries, potentially resulting in loss of data integrity.
1 affected package
amd64-microcode
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| amd64-microcode | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
Improper access control within AMD SEV-SNP could allow an admin privileged attacker to write to the RMP during SNP initialization, potentially resulting in a loss of SEV-SNP guest memory integrity.
1 affected package
amd64-microcode
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| amd64-microcode | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
A transient execution vulnerability in some AMD processors may allow a user process to infer TSC_AUX even when such a read is disabled, potentially resulting in information leakage.
1 affected package
amd64-microcode
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| amd64-microcode | Not affected | Not affected | Not affected | Not affected |
A transient execution vulnerability in some AMD processors may allow a user process to infer the control registers speculatively even if UMIP feature is enabled, potentially resulting in information leakage.
1 affected package
amd64-microcode
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| amd64-microcode | Not affected | Not affected | Not affected | Not affected |