Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-26932
HistoryFeb 17, 2021 - 12:00 a.m.

CVE-2021-26932

2021-02-1700:00:00
ubuntu.com
ubuntu.com
12

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

1.9 Low

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:N/I:N/A:P

0.0004 Low

EPSS

Percentile

13.3%

An issue was discovered in the Linux kernel 3.2 through 5.10.16, as used by
Xen. Grant mapping operations often occur in batch hypercalls, where a
number of operations are done in a single hypercall, the success or failure
of each one is reported to the backend driver, and the backend driver then
loops over the results, performing follow-up actions based on the success
or failure of each operation. Unfortunately, when running in PV mode, the
Linux backend drivers mishandle this: Some errors are ignored, effectively
implying their success from the success of related batch elements. In other
cases, errors resulting from one batch element lead to further batch
elements not being inspected, and hence successful ones to not be possible
to properly unmap upon error recovery. Only systems with Linux backends
running in PV mode are vulnerable. Linux backends run in HVM / PVH modes
are not vulnerable. This affects arch/*/xen/p2m.c and drivers/xen/gntdev.c.

OSVersionArchitecturePackageVersionFilename
ubuntu16.04noarchlinux< 4.4.0-208.240) Available with Ubuntu Pro or Ubuntu Pro (Infra-onlyUNKNOWN
ubuntu18.04noarchlinux< 4.15.0-143.147UNKNOWN
ubuntu20.04noarchlinux< 5.4.0-71.79UNKNOWN
ubuntu16.04noarchlinux-aws< 4.4.0-1126.140) Available with Ubuntu Pro or Ubuntu Pro (Infra-onlyUNKNOWN
ubuntu18.04noarchlinux-aws< 4.15.0-1102.109UNKNOWN
ubuntu20.04noarchlinux-aws< 5.4.0-1043.45UNKNOWN
ubuntu14.04noarchlinux-aws< 4.4.0-1090.94) Available with Ubuntu Pro or Ubuntu Pro (Infra-onlyUNKNOWN
ubuntu18.04noarchlinux-aws-5.4< 5.4.0-1043.45~18.04.1UNKNOWN
ubuntu16.04noarchlinux-aws-hwe< 4.15.0-1102.109~16.04.1) Available with Ubuntu Pro or Ubuntu Pro (Infra-onlyUNKNOWN
ubuntu20.04noarchlinux-azure< 5.4.0-1044.46UNKNOWN
Rows per page:
1-10 of 391

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

1.9 Low

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:N/I:N/A:P

0.0004 Low

EPSS

Percentile

13.3%