{"id":"CVE-2021-26931","details":"An issue was discovered in the Linux kernel 2.6.39 through 5.10.16, as used in Xen. Block, net, and SCSI backends consider certain errors a plain bug, deliberately causing a kernel crash. For errors potentially being at least under the influence of guests (such as out of memory conditions), it isn't correct to assume a plain bug. Memory allocations potentially causing such crashes occur only when Linux is running in PV mode, though. This affects drivers/block/xen-blkback/blkback.c and drivers/xen/xen-scsiback.c.","modified":"2026-03-15T22:39:48.972432Z","published":"2021-02-17T02:15:12.987Z","related":["MGASA-2021-0099","MGASA-2021-0100","MGASA-2021-0101","MGASA-2021-0102","SUSE-SU-2021:0735-1","SUSE-SU-2021:0736-1","SUSE-SU-2021:0737-1","SUSE-SU-2021:0738-1","SUSE-SU-2021:0740-1","SUSE-SU-2021:0741-1","SUSE-SU-2021:0743-1","SUSE-SU-2021:0744-1","SUSE-SU-2021:1175-1","SUSE-SU-2021:1176-1","SUSE-SU-2021:1210-1","SUSE-SU-2021:1344-1","SUSE-SU-2021:1365-1","SUSE-SU-2021:1373-1","openSUSE-SU-2021:0393-1"],"references":[{"type":"WEB","url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3194a1746e8aabe86075fd3c5e7cf1f4632d7f16"},{"type":"WEB","url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5a264285ed1cd32e26d9de4f3c8c6855e467fd63"},{"type":"WEB","url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7c77474b2d22176d2bfb592ec74e0f2cb71352c9"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2XQR52ICKRK3GC4HDWLMWF2U55YGAR63/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GWQWPWYZRXVFJI5M3VCM72X27IB7CKOB/"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20210326-0001/"},{"type":"FIX","url":"http://xenbits.xen.org/xsa/advisory-362.html"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-26931.json","unresolved_ranges":[{"events":[{"introduced":"2.6.39"},{"last_affected":"5.10.16"}]},{"events":[{"introduced":"0"},{"last_affected":"32"}]},{"events":[{"introduced":"0"},{"last_affected":"33"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}