CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
14.2%
An issue was discovered in the Linux kernel 2.6.39 through 5.10.16, as used
in Xen. Block, net, and SCSI backends consider certain errors a plain bug,
deliberately causing a kernel crash. For errors potentially being at least
under the influence of guests (such as out of memory conditions), it isn’t
correct to assume a plain bug. Memory allocations potentially causing such
crashes occur only when Linux is running in PV mode, though. This affects
drivers/block/xen-blkback/blkback.c and drivers/xen/xen-scsiback.c.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < 4.15.0-143.147 | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < 5.4.0-71.79 | UNKNOWN |
ubuntu | 20.10 | noarch | linux | < 5.8.0-53.60 | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < 4.4.0-207.239 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < 4.15.0-1102.109 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < 5.4.0-1043.45 | UNKNOWN |
ubuntu | 20.10 | noarch | linux-aws | < 5.8.0-1033.35 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-aws | < 4.4.0-1090.94 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-aws | < 4.4.0-1126.140 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | < 5.4.0-1043.45~18.04.1 | UNKNOWN |
launchpad.net/bugs/cve/CVE-2021-26931
nvd.nist.gov/vuln/detail/CVE-2021-26931
security-tracker.debian.org/tracker/CVE-2021-26931
ubuntu.com/security/notices/USN-4904-1
ubuntu.com/security/notices/USN-4909-1
ubuntu.com/security/notices/USN-4946-1
ubuntu.com/security/notices/USN-4949-1
www.cve.org/CVERecord?id=CVE-2021-26931
www.openwall.com/lists/oss-security/2021/02/16/4
xenbits.xen.org/xsa/advisory-362.html
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
14.2%