First published: Wed Feb 17 2021(Updated: )
An issue was discovered in the Linux kernel 2.6.39 through 5.10.16, as used in Xen. Block, net, and SCSI backends consider certain errors a plain bug, deliberately causing a kernel crash. For errors potentially being at least under the influence of guests (such as out of memory conditions), it isn't correct to assume a plain bug. Memory allocations potentially causing such crashes occur only when Linux is running in PV mode, though. This affects drivers/block/xen-blkback/blkback.c and drivers/xen/xen-scsiback.c.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=2.6.39<=5.10.16 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Debian Debian Linux | =9.0 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.10-1 6.12.11-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-26931 is classified as a high severity vulnerability due to its potential to cause kernel crashes.
To fix CVE-2021-26931, update your Linux kernel to version 5.10.223-1, 5.10.226-1, 6.1.123-1, 6.1.119-1, or 6.12.10-1, depending on your distribution.
CVE-2021-26931 affects Linux kernel versions from 2.6.39 to 5.10.16.
Systems running certain versions of the Linux kernel, Fedora 32 and 33, and Debian 9.0 are vulnerable to CVE-2021-26931.
There is no specific workaround for CVE-2021-26931, and the recommended action is to apply the available updates.