vulnerability
Ubuntu: (Multiple Advisories) (CVE-2021-26930): Linux kernel vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:N/C:P/I:P/A:P) | Feb 17, 2021 | Apr 14, 2021 | Mar 22, 2023 |
Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
Feb 17, 2021
Added
Apr 14, 2021
Modified
Mar 22, 2023
Description
An issue was discovered in the Linux kernel 3.11 through 5.10.16, as used by Xen. To service requests to the PV backend, the driver maps grant references provided by the frontend. In this process, errors may be encountered. In one case, an error encountered earlier might be discarded by later processing, resulting in the caller assuming successful mapping, and hence subsequent operations trying to access space that wasn't mapped. In another case, internal state would be insufficiently updated, preventing safe recovery from the error. This affects drivers/block/xen-blkback/blkback.c.
Solutions
ubuntu-upgrade-linux-image-4-15-0-1018-dell300xubuntu-upgrade-linux-image-4-15-0-1071-oracleubuntu-upgrade-linux-image-4-15-0-1085-raspi2ubuntu-upgrade-linux-image-4-15-0-1091-kvmubuntu-upgrade-linux-image-4-15-0-1099-gcpubuntu-upgrade-linux-image-4-15-0-1102-awsubuntu-upgrade-linux-image-4-15-0-1102-snapdragonubuntu-upgrade-linux-image-4-15-0-1114-azureubuntu-upgrade-linux-image-4-15-0-143-genericubuntu-upgrade-linux-image-4-15-0-143-generic-lpaeubuntu-upgrade-linux-image-4-15-0-143-lowlatencyubuntu-upgrade-linux-image-4-4-0-1090-awsubuntu-upgrade-linux-image-4-4-0-1091-kvmubuntu-upgrade-linux-image-4-4-0-1126-awsubuntu-upgrade-linux-image-4-4-0-1150-raspi2ubuntu-upgrade-linux-image-4-4-0-1154-snapdragonubuntu-upgrade-linux-image-4-4-0-208-genericubuntu-upgrade-linux-image-4-4-0-208-generic-lpaeubuntu-upgrade-linux-image-4-4-0-208-lowlatencyubuntu-upgrade-linux-image-4-4-0-208-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-208-powerpc-smpubuntu-upgrade-linux-image-4-4-0-208-powerpc64-embubuntu-upgrade-linux-image-4-4-0-208-powerpc64-smpubuntu-upgrade-linux-image-5-4-0-1013-gkeopubuntu-upgrade-linux-image-5-4-0-1033-raspiubuntu-upgrade-linux-image-5-4-0-1037-kvmubuntu-upgrade-linux-image-5-4-0-1040-gkeubuntu-upgrade-linux-image-5-4-0-1041-gcpubuntu-upgrade-linux-image-5-4-0-1042-oracleubuntu-upgrade-linux-image-5-4-0-1043-awsubuntu-upgrade-linux-image-5-4-0-1044-azureubuntu-upgrade-linux-image-5-4-0-71-genericubuntu-upgrade-linux-image-5-4-0-71-generic-lpaeubuntu-upgrade-linux-image-5-4-0-71-lowlatencyubuntu-upgrade-linux-image-5-8-0-1024-raspiubuntu-upgrade-linux-image-5-8-0-1024-raspi-nolpaeubuntu-upgrade-linux-image-5-8-0-1027-kvmubuntu-upgrade-linux-image-5-8-0-1029-oracleubuntu-upgrade-linux-image-5-8-0-1031-gcpubuntu-upgrade-linux-image-5-8-0-1032-azureubuntu-upgrade-linux-image-5-8-0-1033-awsubuntu-upgrade-linux-image-5-8-0-53-genericubuntu-upgrade-linux-image-5-8-0-53-generic-64kubuntu-upgrade-linux-image-5-8-0-53-generic-lpaeubuntu-upgrade-linux-image-5-8-0-53-lowlatencyubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-hweubuntu-upgrade-linux-image-aws-lts-18-04ubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-lts-18-04ubuntu-upgrade-linux-image-dell300xubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-gcp-lts-18-04ubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-64kubuntu-upgrade-linux-image-generic-64k-hwe-20-04ubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-hwe-18-04ubuntu-upgrade-linux-image-generic-hwe-20-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-18-04ubuntu-upgrade-linux-image-generic-lpae-hwe-20-04ubuntu-upgrade-linux-image-generic-lpae-lts-xenialubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-gke-5-4ubuntu-upgrade-linux-image-gkeopubuntu-upgrade-linux-image-gkeop-5-4ubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-hwe-18-04ubuntu-upgrade-linux-image-lowlatency-hwe-20-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-oem-20-04ubuntu-upgrade-linux-image-oem-osp1ubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-oracle-lts-18-04ubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-raspiubuntu-upgrade-linux-image-raspi-hwe-18-04ubuntu-upgrade-linux-image-raspi-nolpaeubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-snapdragon-hwe-18-04ubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-16-04ubuntu-upgrade-linux-image-virtual-hwe-18-04ubuntu-upgrade-linux-image-virtual-hwe-20-04ubuntu-upgrade-linux-image-virtual-lts-xenial
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.