Description
An issue was discovered in the Linux kernel 3.2 through 5.10.16, as used by Xen. Grant mapping operations often occur in batch hypercalls, where a number of operations are done in a single hypercall, the success or failure of each one is reported to the backend driver, and the backend driver then loops over the results, performing follow-up actions based on the success or failure of each operation. Unfortunately, when running in PV mode, the Linux backend drivers mishandle this: Some errors are ignored, effectively implying their success from the success of related batch elements. In other cases, errors resulting from one batch element lead to further batch elements not being inspected, and hence successful ones to not be possible to properly unmap upon error recovery. Only systems with Linux backends running in PV mode are vulnerable. Linux backends run in HVM / PVH modes are not vulnerable. This affects arch/*/xen/p2m.c and drivers/xen/gntdev.c.
Published: 2021-02-17
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-2586-1 linux security update
Debian DLA Debian DLA DLA-2610-1 linux-4.19 security update
History

No history.

Subscriptions

Debian Debian Linux
Fedoraproject Fedora
Linux Linux Kernel
Netapp Cloud Backup Hci Compute Node Hci H410c Hci H410c Firmware Solidfire\, Enterprise Sds \& Hci Storage Node Solidfire \& Hci Management Node
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T20:33:41.471Z

Reserved: 2021-02-09T00:00:00.000Z

Link: CVE-2021-26932

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-02-17T02:15:13.033

Modified: 2024-11-21T05:57:04.490

Link: CVE-2021-26932

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses