Количество 32
Количество 32

CVE-2021-26930
An issue was discovered in the Linux kernel 3.11 through 5.10.16, as used by Xen. To service requests to the PV backend, the driver maps grant references provided by the frontend. In this process, errors may be encountered. In one case, an error encountered earlier might be discarded by later processing, resulting in the caller assuming successful mapping, and hence subsequent operations trying to access space that wasn't mapped. In another case, internal state would be insufficiently updated, preventing safe recovery from the error. This affects drivers/block/xen-blkback/blkback.c.

CVE-2021-26930
An issue was discovered in the Linux kernel 3.11 through 5.10.16, as used by Xen. To service requests to the PV backend, the driver maps grant references provided by the frontend. In this process, errors may be encountered. In one case, an error encountered earlier might be discarded by later processing, resulting in the caller assuming successful mapping, and hence subsequent operations trying to access space that wasn't mapped. In another case, internal state would be insufficiently updated, preventing safe recovery from the error. This affects drivers/block/xen-blkback/blkback.c.

CVE-2021-26930
CVE-2021-26930
An issue was discovered in the Linux kernel 3.11 through 5.10.16, as u ...
GHSA-2q89-537g-gjqw
An issue was discovered in the Linux kernel 3.11 through 5.10.16, as used by Xen. To service requests to the PV backend, the driver maps grant references provided by the frontend. In this process, errors may be encountered. In one case, an error encountered earlier might be discarded by later processing, resulting in the caller assuming successful mapping, and hence subsequent operations trying to access space that wasn't mapped. In another case, internal state would be insufficiently updated, preventing safe recovery from the error. This affects drivers/block/xen-blkback/blkback.c.

BDU:2021-02594
Уязвимость компонента drivers/block/xen-blkback/blkback.c ядра операционных систем Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

SUSE-SU-2021:1373-1
Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP3)
ELSA-2021-9136
ELSA-2021-9136: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2021-9135
ELSA-2021-9135: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2021-9068
ELSA-2021-9068: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2021-9067
ELSA-2021-9067: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2021-9058
ELSA-2021-9058: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2021-9057
ELSA-2021-9057: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2021-9053
ELSA-2021-9053: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2021-9052
ELSA-2021-9052: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2021-9051
ELSA-2021-9051: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2021:1344-1
Security update for the Linux Kernel (Live Patch 20 for SLE 15)

SUSE-SU-2021:0744-1
Security update for the Linux Kernel

SUSE-SU-2021:0743-1
Security update for the Linux Kernel
ELSA-2021-9079
ELSA-2021-9079: Unbreakable Enterprise kernel security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2021-26930 An issue was discovered in the Linux kernel 3.11 through 5.10.16, as used by Xen. To service requests to the PV backend, the driver maps grant references provided by the frontend. In this process, errors may be encountered. In one case, an error encountered earlier might be discarded by later processing, resulting in the caller assuming successful mapping, and hence subsequent operations trying to access space that wasn't mapped. In another case, internal state would be insufficiently updated, preventing safe recovery from the error. This affects drivers/block/xen-blkback/blkback.c. | CVSS3: 7.8 | 0% Низкий | больше 4 лет назад |
![]() | CVE-2021-26930 An issue was discovered in the Linux kernel 3.11 through 5.10.16, as used by Xen. To service requests to the PV backend, the driver maps grant references provided by the frontend. In this process, errors may be encountered. In one case, an error encountered earlier might be discarded by later processing, resulting in the caller assuming successful mapping, and hence subsequent operations trying to access space that wasn't mapped. In another case, internal state would be insufficiently updated, preventing safe recovery from the error. This affects drivers/block/xen-blkback/blkback.c. | CVSS3: 7.8 | 0% Низкий | больше 4 лет назад |
![]() | CVSS3: 7.8 | 0% Низкий | больше 4 лет назад | |
CVE-2021-26930 An issue was discovered in the Linux kernel 3.11 through 5.10.16, as u ... | CVSS3: 7.8 | 0% Низкий | больше 4 лет назад | |
GHSA-2q89-537g-gjqw An issue was discovered in the Linux kernel 3.11 through 5.10.16, as used by Xen. To service requests to the PV backend, the driver maps grant references provided by the frontend. In this process, errors may be encountered. In one case, an error encountered earlier might be discarded by later processing, resulting in the caller assuming successful mapping, and hence subsequent operations trying to access space that wasn't mapped. In another case, internal state would be insufficiently updated, preventing safe recovery from the error. This affects drivers/block/xen-blkback/blkback.c. | CVSS3: 7.8 | 0% Низкий | около 3 лет назад | |
![]() | BDU:2021-02594 Уязвимость компонента drivers/block/xen-blkback/blkback.c ядра операционных систем Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации | CVSS3: 7.8 | 0% Низкий | больше 4 лет назад |
![]() | SUSE-SU-2021:1373-1 Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP3) | около 4 лет назад | ||
ELSA-2021-9136 ELSA-2021-9136: Unbreakable Enterprise kernel-container security update (IMPORTANT) | около 4 лет назад | |||
ELSA-2021-9135 ELSA-2021-9135: Unbreakable Enterprise kernel security update (IMPORTANT) | около 4 лет назад | |||
ELSA-2021-9068 ELSA-2021-9068: Unbreakable Enterprise kernel-container security update (IMPORTANT) | больше 4 лет назад | |||
ELSA-2021-9067 ELSA-2021-9067: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 4 лет назад | |||
ELSA-2021-9058 ELSA-2021-9058: Unbreakable Enterprise kernel-container security update (IMPORTANT) | больше 4 лет назад | |||
ELSA-2021-9057 ELSA-2021-9057: Unbreakable Enterprise kernel-container security update (IMPORTANT) | больше 4 лет назад | |||
ELSA-2021-9053 ELSA-2021-9053: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 4 лет назад | |||
ELSA-2021-9052 ELSA-2021-9052: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 4 лет назад | |||
ELSA-2021-9051 ELSA-2021-9051: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 4 лет назад | |||
![]() | SUSE-SU-2021:1344-1 Security update for the Linux Kernel (Live Patch 20 for SLE 15) | около 4 лет назад | ||
![]() | SUSE-SU-2021:0744-1 Security update for the Linux Kernel | больше 4 лет назад | ||
![]() | SUSE-SU-2021:0743-1 Security update for the Linux Kernel | больше 4 лет назад | ||
ELSA-2021-9079 ELSA-2021-9079: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 4 лет назад |
Уязвимостей на страницу