{"api_version":"1","generated_at":"2026-04-22T22:49:49+00:00","cve":"CVE-2021-26932","urls":{"html":"https://cve.report/CVE-2021-26932","api":"https://cve.report/api/cve/CVE-2021-26932.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-26932","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-26932"},"summary":{"title":"CVE-2021-26932","description":"An issue was discovered in the Linux kernel 3.2 through 5.10.16, as used by Xen. Grant mapping operations often occur in batch hypercalls, where a number of operations are done in a single hypercall, the success or failure of each one is reported to the backend driver, and the backend driver then loops over the results, performing follow-up actions based on the success or failure of each operation. Unfortunately, when running in PV mode, the Linux backend drivers mishandle this: Some errors are ignored, effectively implying their success from the success of related batch elements. In other cases, errors resulting from one batch element lead to further batch elements not being inspected, and hence successful ones to not be possible to properly unmap upon error recovery. Only systems with Linux backends running in PV mode are vulnerable. Linux backends run in HVM / PVH modes are not vulnerable. This affects arch/*/xen/p2m.c and drivers/xen/gntdev.c.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2021-02-17 02:15:00","updated_at":"2023-11-07 03:31:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GWQWPWYZRXVFJI5M3VCM72X27IB7CKOB/","name":"FEDORA-2021-7143aca8cb","refsource":"","tags":[],"title":"[SECURITY] Fedora 33 Update: kernel-5.10.18-200.fc33 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html","name":"[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 2586-1] linux security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://xenbits.xen.org/xsa/advisory-361.html","name":"http://xenbits.xen.org/xsa/advisory-361.html","refsource":"MISC","tags":["Patch","Third Party Advisory"],"title":"XSA-361 - Xen Security Advisories","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html","name":"[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 2610-1] linux-4.19 security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security.netapp.com/advisory/ntap-20210326-0001/","name":"https://security.netapp.com/advisory/ntap-20210326-0001/","refsource":"CONFIRM","tags":[],"title":"February 2021 Linux Kernel Vulnerabilities in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2XQR52ICKRK3GC4HDWLMWF2U55YGAR63/","name":"FEDORA-2021-8d45d297c6","refsource":"FEDORA","tags":["Mailing List","Patch","Third Party Advisory"],"title":"[SECURITY] Fedora 32 Update: kernel-5.10.18-100.fc32 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2XQR52ICKRK3GC4HDWLMWF2U55YGAR63/","name":"FEDORA-2021-8d45d297c6","refsource":"","tags":[],"title":"[SECURITY] Fedora 32 Update: kernel-5.10.18-100.fc32 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GWQWPWYZRXVFJI5M3VCM72X27IB7CKOB/","name":"FEDORA-2021-7143aca8cb","refsource":"FEDORA","tags":["Mailing List","Patch","Third Party Advisory"],"title":"[SECURITY] Fedora 33 Update: kernel-5.10.18-200.fc33 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-26932","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-26932","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"26932","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"26932","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"32","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"26932","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"33","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"26932","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"32","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"26932","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"33","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"26932","vulnerable":"1","versionEndIncluding":"5.10.16","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"26932","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netapp","cpe5":"cloud_backup","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"26932","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netapp","cpe5":"hci_compute_node","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"26932","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"netapp","cpe5":"hci_h410c","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"26932","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netapp","cpe5":"hci_h410c_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"26932","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netapp","cpe5":"solidfire\\,_enterprise_sds_\\&_hci_storage_node","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"26932","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netapp","cpe5":"solidfire_\\&_hci_management_node","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-26932","qid":"159132","title":"Oracle Enterprise Linux Security Update for Unbreakable Enterprise kernel (ELSA-2021-9135)"},{"cve":"CVE-2021-26932","qid":"159133","title":"Oracle Enterprise Linux Security Update for Unbreakable Enterprise kernel-container (ELSA-2021-9136)"},{"cve":"CVE-2021-26932","qid":"174764","title":"SUSE Enterprise Linux Security update for the Linux Kernel (SUSE-SU-2021:0738-1)"},{"cve":"CVE-2021-26932","qid":"174768","title":"SUSE Enterprise Linux Security update for the Linux Kernel (SUSE-SU-2021:0735-1)"},{"cve":"CVE-2021-26932","qid":"174770","title":"SUSE Enterprise Linux Security update for the Linux Kernel (SUSE-SU-2021:0741-1)"},{"cve":"CVE-2021-26932","qid":"174772","title":"SUSE Enterprise Linux Security update for the Linux Kernel (SUSE-SU-2021:0737-1)"},{"cve":"CVE-2021-26932","qid":"174774","title":"SUSE Enterprise Linux Security update for the Linux Kernel (SUSE-SU-2021:0740-1)"},{"cve":"CVE-2021-26932","qid":"174897","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:1175-1)"},{"cve":"CVE-2021-26932","qid":"174916","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:1210-1)"},{"cve":"CVE-2021-26932","qid":"178507","title":"Debian Security Update for linux-4.19 (DLA 2610-1)"},{"cve":"CVE-2021-26932","qid":"180024","title":"Debian Security Update for linux (CVE-2021-26932)"},{"cve":"CVE-2021-26932","qid":"352244","title":"Amazon Linux Security Advisory for kernel: ALAS-2021-1487"},{"cve":"CVE-2021-26932","qid":"352254","title":"Amazon Linux Security Advisory for kernel: ALAS2-2021-1616"},{"cve":"CVE-2021-26932","qid":"353100","title":"Amazon Linux Security Advisory for kernel : ALAC2012-2021-024"},{"cve":"CVE-2021-26932","qid":"353101","title":"Amazon Linux Security Advisory for kmod-mlx5 : ALAC2012-2021-025"},{"cve":"CVE-2021-26932","qid":"353102","title":"Amazon Linux Security Advisory for kmod-sfc : ALAC2012-2021-026"},{"cve":"CVE-2021-26932","qid":"353150","title":"Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.4-2022-001"},{"cve":"CVE-2021-26932","qid":"375405","title":"FreeBSD Security Update for FreeBSD (5b8c6e1e-770f-11eb-b87a-901b0ef719ab)"},{"cve":"CVE-2021-26932","qid":"379053","title":"Citrix XenServer Security Updates (CTX296603)"},{"cve":"CVE-2021-26932","qid":"6140130","title":"AWS Bottlerocket Security Update for kernel (GHSA-xgcp-q5f9-v447)"},{"cve":"CVE-2021-26932","qid":"671474","title":"EulerOS Security Update for kernel (EulerOS-SA-2022-1429)"},{"cve":"CVE-2021-26932","qid":"750324","title":"OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2021:0393-1)"},{"cve":"CVE-2021-26932","qid":"900098","title":"CBL-Mariner Linux Security Update for kernel 5.4.91"},{"cve":"CVE-2021-26932","qid":"903636","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (3901)"},{"cve":"CVE-2021-26932","qid":"906191","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (3901-1)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2021-26932","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An issue was discovered in the Linux kernel 3.2 through 5.10.16, as used by Xen. Grant mapping operations often occur in batch hypercalls, where a number of operations are done in a single hypercall, the success or failure of each one is reported to the backend driver, and the backend driver then loops over the results, performing follow-up actions based on the success or failure of each operation. Unfortunately, when running in PV mode, the Linux backend drivers mishandle this: Some errors are ignored, effectively implying their success from the success of related batch elements. In other cases, errors resulting from one batch element lead to further batch elements not being inspected, and hence successful ones to not be possible to properly unmap upon error recovery. Only systems with Linux backends running in PV mode are vulnerable. Linux backends run in HVM / PVH modes are not vulnerable. This affects arch/*/xen/p2m.c and drivers/xen/gntdev.c."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"http://xenbits.xen.org/xsa/advisory-361.html","refsource":"MISC","name":"http://xenbits.xen.org/xsa/advisory-361.html"},{"refsource":"FEDORA","name":"FEDORA-2021-8d45d297c6","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2XQR52ICKRK3GC4HDWLMWF2U55YGAR63/"},{"refsource":"FEDORA","name":"FEDORA-2021-7143aca8cb","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GWQWPWYZRXVFJI5M3VCM72X27IB7CKOB/"},{"refsource":"MLIST","name":"[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update","url":"https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20210326-0001/","url":"https://security.netapp.com/advisory/ntap-20210326-0001/"},{"refsource":"MLIST","name":"[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update","url":"https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html"}]}},"nvd":{"publishedDate":"2021-02-17 02:15:00","lastModifiedDate":"2023-11-07 03:31:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":5.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.8,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:M/Au:N/C:N/I:N/A:P","accessVector":"LOCAL","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL","baseScore":1.9},"severity":"LOW","exploitabilityScore":3.4,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.2","versionEndIncluding":"5.10.16","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:netapp:solidfire\\,_enterprise_sds_\\&_hci_storage_node:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netapp:hci_compute_node:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netapp:hci_h410c_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:netapp:hci_h410c:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"26932","Ordinal":"202014","Title":"CVE-2021-26932","CVE":"CVE-2021-26932","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"26932","Ordinal":"1","NoteData":"An issue was discovered in the Linux kernel 3.2 through 5.10.16, as used by Xen. Grant mapping operations often occur in batch hypercalls, where a number of operations are done in a single hypercall, the success or failure of each one is reported to the backend driver, and the backend driver then loops over the results, performing follow-up actions based on the success or failure of each operation. Unfortunately, when running in PV mode, the Linux backend drivers mishandle this: Some errors are ignored, effectively implying their success from the success of related batch elements. In other cases, errors resulting from one batch element lead to further batch elements not being inspected, and hence successful ones to not be possible to properly unmap upon error recovery. Only systems with Linux backends running in PV mode are vulnerable. Linux backends run in HVM / PVH modes are not vulnerable. This affects arch/*/xen/p2m.c and drivers/xen/gntdev.c.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"26932","Ordinal":"2","NoteData":"2021-02-16","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"26932","Ordinal":"3","NoteData":"2021-03-30","Type":"Other","Title":"Modified"}]}}}