Количество 29
Количество 29
GHSA-w8vm-5jg7-3r38
An issue was discovered in the Linux kernel 3.2 through 5.10.16, as used by Xen. Grant mapping operations often occur in batch hypercalls, where a number of operations are done in a single hypercall, the success or failure of each one is reported to the backend driver, and the backend driver then loops over the results, performing follow-up actions based on the success or failure of each operation. Unfortunately, when running in PV mode, the Linux backend drivers mishandle this: Some errors are ignored, effectively implying their success from the success of related batch elements. In other cases, errors resulting from one batch element lead to further batch elements not being inspected, and hence successful ones to not be possible to properly unmap upon error recovery. Only systems with Linux backends running in PV mode are vulnerable. Linux backends run in HVM / PVH modes are not vulnerable. This affects arch/*/xen/p2m.c and drivers/xen/gntdev.c.

CVE-2021-26932
An issue was discovered in the Linux kernel 3.2 through 5.10.16, as used by Xen. Grant mapping operations often occur in batch hypercalls, where a number of operations are done in a single hypercall, the success or failure of each one is reported to the backend driver, and the backend driver then loops over the results, performing follow-up actions based on the success or failure of each operation. Unfortunately, when running in PV mode, the Linux backend drivers mishandle this: Some errors are ignored, effectively implying their success from the success of related batch elements. In other cases, errors resulting from one batch element lead to further batch elements not being inspected, and hence successful ones to not be possible to properly unmap upon error recovery. Only systems with Linux backends running in PV mode are vulnerable. Linux backends run in HVM / PVH modes are not vulnerable. This affects arch/*/xen/p2m.c and drivers/xen/gntdev.c.

CVE-2021-26932
An issue was discovered in the Linux kernel 3.2 through 5.10.16, as used by Xen. Grant mapping operations often occur in batch hypercalls, where a number of operations are done in a single hypercall, the success or failure of each one is reported to the backend driver, and the backend driver then loops over the results, performing follow-up actions based on the success or failure of each operation. Unfortunately, when running in PV mode, the Linux backend drivers mishandle this: Some errors are ignored, effectively implying their success from the success of related batch elements. In other cases, errors resulting from one batch element lead to further batch elements not being inspected, and hence successful ones to not be possible to properly unmap upon error recovery. Only systems with Linux backends running in PV mode are vulnerable. Linux backends run in HVM / PVH modes are not vulnerable. This affects arch/*/xen/p2m.c and drivers/xen/gntdev.c.

CVE-2021-26932
CVE-2021-26932
An issue was discovered in the Linux kernel 3.2 through 5.10.16, as us ...

BDU:2021-02595
Уязвимость компонентов arch/*/xen/p2m.c, drivers/xen/gntdev.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
ELSA-2021-9136
ELSA-2021-9136: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2021-9135
ELSA-2021-9135: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2021-9068
ELSA-2021-9068: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2021-9067
ELSA-2021-9067: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2021-9058
ELSA-2021-9058: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2021-9057
ELSA-2021-9057: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2021-9053
ELSA-2021-9053: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2021-9052
ELSA-2021-9052: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2021-9051
ELSA-2021-9051: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2021:0744-1
Security update for the Linux Kernel

SUSE-SU-2021:0743-1
Security update for the Linux Kernel
ELSA-2021-9079
ELSA-2021-9079: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2021:0740-1
Security update for the Linux Kernel

SUSE-SU-2021:0737-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-w8vm-5jg7-3r38 An issue was discovered in the Linux kernel 3.2 through 5.10.16, as used by Xen. Grant mapping operations often occur in batch hypercalls, where a number of operations are done in a single hypercall, the success or failure of each one is reported to the backend driver, and the backend driver then loops over the results, performing follow-up actions based on the success or failure of each operation. Unfortunately, when running in PV mode, the Linux backend drivers mishandle this: Some errors are ignored, effectively implying their success from the success of related batch elements. In other cases, errors resulting from one batch element lead to further batch elements not being inspected, and hence successful ones to not be possible to properly unmap upon error recovery. Only systems with Linux backends running in PV mode are vulnerable. Linux backends run in HVM / PVH modes are not vulnerable. This affects arch/*/xen/p2m.c and drivers/xen/gntdev.c. | CVSS3: 5.5 | 0% Низкий | около 3 лет назад | |
![]() | CVE-2021-26932 An issue was discovered in the Linux kernel 3.2 through 5.10.16, as used by Xen. Grant mapping operations often occur in batch hypercalls, where a number of operations are done in a single hypercall, the success or failure of each one is reported to the backend driver, and the backend driver then loops over the results, performing follow-up actions based on the success or failure of each operation. Unfortunately, when running in PV mode, the Linux backend drivers mishandle this: Some errors are ignored, effectively implying their success from the success of related batch elements. In other cases, errors resulting from one batch element lead to further batch elements not being inspected, and hence successful ones to not be possible to properly unmap upon error recovery. Only systems with Linux backends running in PV mode are vulnerable. Linux backends run in HVM / PVH modes are not vulnerable. This affects arch/*/xen/p2m.c and drivers/xen/gntdev.c. | CVSS3: 5.5 | 0% Низкий | больше 4 лет назад |
![]() | CVE-2021-26932 An issue was discovered in the Linux kernel 3.2 through 5.10.16, as used by Xen. Grant mapping operations often occur in batch hypercalls, where a number of operations are done in a single hypercall, the success or failure of each one is reported to the backend driver, and the backend driver then loops over the results, performing follow-up actions based on the success or failure of each operation. Unfortunately, when running in PV mode, the Linux backend drivers mishandle this: Some errors are ignored, effectively implying their success from the success of related batch elements. In other cases, errors resulting from one batch element lead to further batch elements not being inspected, and hence successful ones to not be possible to properly unmap upon error recovery. Only systems with Linux backends running in PV mode are vulnerable. Linux backends run in HVM / PVH modes are not vulnerable. This affects arch/*/xen/p2m.c and drivers/xen/gntdev.c. | CVSS3: 5.5 | 0% Низкий | больше 4 лет назад |
![]() | CVSS3: 5.5 | 0% Низкий | больше 4 лет назад | |
CVE-2021-26932 An issue was discovered in the Linux kernel 3.2 through 5.10.16, as us ... | CVSS3: 5.5 | 0% Низкий | больше 4 лет назад | |
![]() | BDU:2021-02595 Уязвимость компонентов arch/*/xen/p2m.c, drivers/xen/gntdev.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | больше 4 лет назад |
ELSA-2021-9136 ELSA-2021-9136: Unbreakable Enterprise kernel-container security update (IMPORTANT) | около 4 лет назад | |||
ELSA-2021-9135 ELSA-2021-9135: Unbreakable Enterprise kernel security update (IMPORTANT) | около 4 лет назад | |||
ELSA-2021-9068 ELSA-2021-9068: Unbreakable Enterprise kernel-container security update (IMPORTANT) | больше 4 лет назад | |||
ELSA-2021-9067 ELSA-2021-9067: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 4 лет назад | |||
ELSA-2021-9058 ELSA-2021-9058: Unbreakable Enterprise kernel-container security update (IMPORTANT) | больше 4 лет назад | |||
ELSA-2021-9057 ELSA-2021-9057: Unbreakable Enterprise kernel-container security update (IMPORTANT) | больше 4 лет назад | |||
ELSA-2021-9053 ELSA-2021-9053: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 4 лет назад | |||
ELSA-2021-9052 ELSA-2021-9052: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 4 лет назад | |||
ELSA-2021-9051 ELSA-2021-9051: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 4 лет назад | |||
![]() | SUSE-SU-2021:0744-1 Security update for the Linux Kernel | больше 4 лет назад | ||
![]() | SUSE-SU-2021:0743-1 Security update for the Linux Kernel | больше 4 лет назад | ||
ELSA-2021-9079 ELSA-2021-9079: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 4 лет назад | |||
![]() | SUSE-SU-2021:0740-1 Security update for the Linux Kernel | больше 4 лет назад | ||
![]() | SUSE-SU-2021:0737-1 Security update for the Linux Kernel | больше 4 лет назад |
Уязвимостей на страницу