An issue was discovered in the Linux kernel 3.11 through 5.10.16, as used by Xen. To service requests to the PV backend, the driver maps grant references provided by the frontend. In this process, errors may be encountered. In one case, an error encountered earlier might be discarded by later processing, resulting in the caller assuming successful mapping, and hence subsequent operations trying to access space that wasn't mapped. In another case, internal state would be insufficiently updated, preventing safe recovery from the error. This affects drivers/block/xen-blkback/blkback.c.
References
Link | Resource |
---|---|
http://xenbits.xen.org/xsa/advisory-365.html | Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2XQR52ICKRK3GC4HDWLMWF2U55YGAR63/ | Mailing List Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GWQWPWYZRXVFJI5M3VCM72X27IB7CKOB/ | Mailing List Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html | Mailing List Third Party Advisory |
https://security.netapp.com/advisory/ntap-20210326-0001/ | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html | Mailing List Third Party Advisory |
Information
Published : 2021-02-16 17:15
Updated : 2022-01-04 08:38
NVD link : CVE-2021-26930
Mitre link : CVE-2021-26930
JSON object : View
CWE
Products Affected
fedoraproject
- fedora
debian
- debian_linux
linux
- linux_kernel