5.5
CVSSv3

CVE-2021-26932

Published: 17/02/2021 Updated: 25/03/2024
CVSS v2 Base Score: 1.9 | Impact Score: 2.9 | Exploitability Score: 3.4
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 169
Vector: AV:L/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

An issue exists in the Linux kernel 3.2 up to and including 5.10.16, as used by Xen. Grant mapping operations often occur in batch hypercalls, where a number of operations are done in a single hypercall, the success or failure of each one is reported to the backend driver, and the backend driver then loops over the results, performing follow-up actions based on the success or failure of each operation. Unfortunately, when running in PV mode, the Linux backend drivers mishandle this: Some errors are ignored, effectively implying their success from the success of related batch elements. In other cases, errors resulting from one batch element lead to further batch elements not being inspected, and hence successful ones to not be possible to properly unmap upon error recovery. Only systems with Linux backends running in PV mode are vulnerable. Linux backends run in HVM / PVH modes are not vulnerable. This affects arch/*/xen/p2m.c and drivers/xen/gntdev.c.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

fedoraproject fedora 32

fedoraproject fedora 33

debian debian linux 9.0

netapp cloud backup -

netapp solidfire \\& hci management node -

netapp solidfire\\, enterprise sds \\& hci storage node -

netapp hci compute node -

netapp hci_h410c_firmware -

Vendor Advisories

An issue was discovered in the Linux kernel 311 through 51016, as used by Xen To service requests to the PV backend, the driver maps grant references provided by the frontend In this process, errors may be encountered In one case, an error encountered earlier might be discarded by later processing, resulting in the caller assuming successful ...
A NULL pointer dereference flaw was found in the Linux kernel's GPU Nouveau driver functionality in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC This flaw allows a local user to crash the system (CVE-2020-25639) An issue was discovered in the Linux kernel 311 through 51016, as used by Xen To service requests to the PV backend, ...
An issue was discovered in the Linux kernel 311 through 51016, as used by Xen To service requests to the PV backend, the driver maps grant references provided by the frontend In this process, errors may be encountered In one case, an error encountered earlier might be discarded by later processing, resulting in the caller assuming successful ...
A security issue was found in the Xen module of the Linux kernel Grant mapping operations often occur in batch hypercalls, where a number of operations are done in a single hypercall, the success or failure of each one reported to the backend driver, and the backend driver then loops over the results, performing follow-up actions based on the succ ...
Several security issues have been identified that, collectively, may allow privileged code running in a guest VM to cause the host to crash or to become unresponsiveThese issues have the following CVE identifiers: ...