rpm package
suse/kgraft-patch-SLE12-SP2_Update_40&distro=SUSE OpenStack Cloud 7
pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_40&distro=SUSE%20OpenStack%20Cloud%207
Vulnerabilities (4)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2021-26932 | — | < 1-3.3.2 | 1-3.3.2 | Feb 17, 2021 | An issue was discovered in the Linux kernel 3.2 through 5.10.16, as used by Xen. Grant mapping operations often occur in batch hypercalls, where a number of operations are done in a single hypercall, the success or failure of each one is reported to the backend driver, and the ba | ||
| CVE-2021-26931 | — | < 1-3.3.2 | 1-3.3.2 | Feb 17, 2021 | An issue was discovered in the Linux kernel 2.6.39 through 5.10.16, as used in Xen. Block, net, and SCSI backends consider certain errors a plain bug, deliberately causing a kernel crash. For errors potentially being at least under the influence of guests (such as out of memory c | ||
| CVE-2021-26930 | — | < 1-3.3.2 | 1-3.3.2 | Feb 17, 2021 | An issue was discovered in the Linux kernel 3.11 through 5.10.16, as used by Xen. To service requests to the PV backend, the driver maps grant references provided by the frontend. In this process, errors may be encountered. In one case, an error encountered earlier might be disca | ||
| CVE-2020-28374 | — | < 1-3.3.2 | 1-3.3.2 | Jan 13, 2021 | In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7, insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c93811e3. For example, an attack c |
- CVE-2021-26932Feb 17, 2021affected < 1-3.3.2fixed 1-3.3.2
An issue was discovered in the Linux kernel 3.2 through 5.10.16, as used by Xen. Grant mapping operations often occur in batch hypercalls, where a number of operations are done in a single hypercall, the success or failure of each one is reported to the backend driver, and the ba
- CVE-2021-26931Feb 17, 2021affected < 1-3.3.2fixed 1-3.3.2
An issue was discovered in the Linux kernel 2.6.39 through 5.10.16, as used in Xen. Block, net, and SCSI backends consider certain errors a plain bug, deliberately causing a kernel crash. For errors potentially being at least under the influence of guests (such as out of memory c
- CVE-2021-26930Feb 17, 2021affected < 1-3.3.2fixed 1-3.3.2
An issue was discovered in the Linux kernel 3.11 through 5.10.16, as used by Xen. To service requests to the PV backend, the driver maps grant references provided by the frontend. In this process, errors may be encountered. In one case, an error encountered earlier might be disca
- CVE-2020-28374Jan 13, 2021affected < 1-3.3.2fixed 1-3.3.2
In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7, insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c93811e3. For example, an attack c