Advisory Published
Updated

CVE-2021-26932

First published: Wed Feb 17 2021(Updated: )

An issue was discovered in the Linux kernel 3.2 through 5.10.16, as used by Xen. Grant mapping operations often occur in batch hypercalls, where a number of operations are done in a single hypercall, the success or failure of each one is reported to the backend driver, and the backend driver then loops over the results, performing follow-up actions based on the success or failure of each operation. Unfortunately, when running in PV mode, the Linux backend drivers mishandle this: Some errors are ignored, effectively implying their success from the success of related batch elements. In other cases, errors resulting from one batch element lead to further batch elements not being inspected, and hence successful ones to not be possible to properly unmap upon error recovery. Only systems with Linux backends running in PV mode are vulnerable. Linux backends run in HVM / PVH modes are not vulnerable. This affects arch/*/xen/p2m.c and drivers/xen/gntdev.c.

Credit: cve@mitre.org cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Linux Kernel>=3.2<=5.10.16
Fedora=32
Fedora=33
Debian=9.0
netapp cloud backup
netapp solidfire\, enterprise sds \& hci storage node
netapp solidfire \& hci management node
netapp hci compute node
All of
NetApp HCI H410C
NetApp HCI H410C Firmware
NetApp HCI H410C
NetApp HCI H410C Firmware

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2021-26932?

    CVE-2021-26932 has been classified with medium severity due to its potential impact on grant mapping operations in the Linux kernel.

  • How do I fix CVE-2021-26932?

    To fix CVE-2021-26932, you should update the Linux kernel to version 5.10.17 or later.

  • Which versions of Linux are affected by CVE-2021-26932?

    CVE-2021-26932 affects Linux kernel versions from 3.2 up to 5.10.16.

  • What types of systems are vulnerable to CVE-2021-26932?

    Systems using affected versions of the Linux kernel, including Fedora and Debian distributions, are vulnerable to CVE-2021-26932.

  • Is there a workaround for CVE-2021-26932?

    Currently, there are no known workarounds for CVE-2021-26932 besides applying the kernel update.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203