ID

VAR-202103-0920


CVE

CVE-2021-27363


TITLE

Linux Kernel  Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2021-004361

DESCRIPTION

An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport's handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module's global variables. Linux Kernel Contains an unspecified vulnerability.Information is obtained and denial of service (DoS) It may be put into a state. 8.2) - x86_64 3. Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Bug Fix(es): * kernel-rt: update RT source tree to the latest RHEL-8.2.z8 Batch source tree (BZ#1916765) 4. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security, bug fix, and enhancement update Advisory ID: RHSA-2021:1272-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:1272 Issue date: 2021-04-20 CVE Names: CVE-2021-3347 CVE-2021-27363 CVE-2021-27364 CVE-2021-27365 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat CodeReady Linux Builder EUS (v. 8.2) - aarch64, ppc64le, x86_64 Red Hat Enterprise Linux BaseOS EUS (v. 8.2) - aarch64, noarch, ppc64le, s390x, x86_64 3. Security Fix(es): * kernel: Use after free via PI futex state (CVE-2021-3347) * kernel: out-of-bounds read in libiscsi module (CVE-2021-27364) * kernel: heap buffer overflow in the iSCSI subsystem (CVE-2021-27365) * kernel: iscsi: unrestricted access to sessions and handles (CVE-2021-27363) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * System Crash / Core dump while deleting VMs (BZ#1897687) * various patches to stabilize the OPAL error log processing and the powernv dump processing (ESS) (BZ#1907302) * Unable to receive the signal registered using mq_notify(). (BZ#1926111) * SCTP "Address already in use" when no active endpoints from RHEL 8.2 onwards (BZ#1927522) * enable CONFIG_RANDOM_TRUST_CPU (BZ#1928027) * [mm] mm, oom: remove oom_lock from oom_reaper (BZ#1929739) * Configuring the system with non-RT kernel will hang the system (BZ#1930737) * fNIC driver needs a patch fix that addresses crash (BZ#1932460) * OVS mistakenly using local IP as tun_dst for VXLAN packets (?) (BZ#1944670) Enhancement(s): * mlx5: Hairpin Support in Switch Mode (BZ#1924690) * Trace mode enablement in IMC to facilitate perf-kvm support (perf:) (BZ#1929696) * ice: Enable Flow Director Support (BZ#1930780) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1922249 - CVE-2021-3347 kernel: Use after free via PI futex state 1930078 - CVE-2021-27365 kernel: heap buffer overflow in the iSCSI subsystem 1930079 - CVE-2021-27363 kernel: iscsi: unrestricted access to sessions and handles 1930080 - CVE-2021-27364 kernel: out-of-bounds read in libiscsi module 6. Package List: Red Hat Enterprise Linux BaseOS EUS (v. 8.2): Source: kernel-4.18.0-193.51.1.el8_2.src.rpm aarch64: bpftool-4.18.0-193.51.1.el8_2.aarch64.rpm bpftool-debuginfo-4.18.0-193.51.1.el8_2.aarch64.rpm kernel-4.18.0-193.51.1.el8_2.aarch64.rpm kernel-core-4.18.0-193.51.1.el8_2.aarch64.rpm kernel-cross-headers-4.18.0-193.51.1.el8_2.aarch64.rpm kernel-debug-4.18.0-193.51.1.el8_2.aarch64.rpm kernel-debug-core-4.18.0-193.51.1.el8_2.aarch64.rpm kernel-debug-debuginfo-4.18.0-193.51.1.el8_2.aarch64.rpm kernel-debug-devel-4.18.0-193.51.1.el8_2.aarch64.rpm kernel-debug-modules-4.18.0-193.51.1.el8_2.aarch64.rpm kernel-debug-modules-extra-4.18.0-193.51.1.el8_2.aarch64.rpm kernel-debuginfo-4.18.0-193.51.1.el8_2.aarch64.rpm kernel-debuginfo-common-aarch64-4.18.0-193.51.1.el8_2.aarch64.rpm kernel-devel-4.18.0-193.51.1.el8_2.aarch64.rpm kernel-headers-4.18.0-193.51.1.el8_2.aarch64.rpm kernel-modules-4.18.0-193.51.1.el8_2.aarch64.rpm kernel-modules-extra-4.18.0-193.51.1.el8_2.aarch64.rpm kernel-tools-4.18.0-193.51.1.el8_2.aarch64.rpm kernel-tools-debuginfo-4.18.0-193.51.1.el8_2.aarch64.rpm kernel-tools-libs-4.18.0-193.51.1.el8_2.aarch64.rpm perf-4.18.0-193.51.1.el8_2.aarch64.rpm perf-debuginfo-4.18.0-193.51.1.el8_2.aarch64.rpm python3-perf-4.18.0-193.51.1.el8_2.aarch64.rpm python3-perf-debuginfo-4.18.0-193.51.1.el8_2.aarch64.rpm noarch: kernel-abi-whitelists-4.18.0-193.51.1.el8_2.noarch.rpm kernel-doc-4.18.0-193.51.1.el8_2.noarch.rpm ppc64le: bpftool-4.18.0-193.51.1.el8_2.ppc64le.rpm bpftool-debuginfo-4.18.0-193.51.1.el8_2.ppc64le.rpm kernel-4.18.0-193.51.1.el8_2.ppc64le.rpm kernel-core-4.18.0-193.51.1.el8_2.ppc64le.rpm kernel-cross-headers-4.18.0-193.51.1.el8_2.ppc64le.rpm kernel-debug-4.18.0-193.51.1.el8_2.ppc64le.rpm kernel-debug-core-4.18.0-193.51.1.el8_2.ppc64le.rpm kernel-debug-debuginfo-4.18.0-193.51.1.el8_2.ppc64le.rpm kernel-debug-devel-4.18.0-193.51.1.el8_2.ppc64le.rpm kernel-debug-modules-4.18.0-193.51.1.el8_2.ppc64le.rpm kernel-debug-modules-extra-4.18.0-193.51.1.el8_2.ppc64le.rpm kernel-debuginfo-4.18.0-193.51.1.el8_2.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.18.0-193.51.1.el8_2.ppc64le.rpm kernel-devel-4.18.0-193.51.1.el8_2.ppc64le.rpm kernel-headers-4.18.0-193.51.1.el8_2.ppc64le.rpm kernel-modules-4.18.0-193.51.1.el8_2.ppc64le.rpm kernel-modules-extra-4.18.0-193.51.1.el8_2.ppc64le.rpm kernel-tools-4.18.0-193.51.1.el8_2.ppc64le.rpm kernel-tools-debuginfo-4.18.0-193.51.1.el8_2.ppc64le.rpm kernel-tools-libs-4.18.0-193.51.1.el8_2.ppc64le.rpm perf-4.18.0-193.51.1.el8_2.ppc64le.rpm perf-debuginfo-4.18.0-193.51.1.el8_2.ppc64le.rpm python3-perf-4.18.0-193.51.1.el8_2.ppc64le.rpm python3-perf-debuginfo-4.18.0-193.51.1.el8_2.ppc64le.rpm s390x: bpftool-4.18.0-193.51.1.el8_2.s390x.rpm bpftool-debuginfo-4.18.0-193.51.1.el8_2.s390x.rpm kernel-4.18.0-193.51.1.el8_2.s390x.rpm kernel-core-4.18.0-193.51.1.el8_2.s390x.rpm kernel-cross-headers-4.18.0-193.51.1.el8_2.s390x.rpm kernel-debug-4.18.0-193.51.1.el8_2.s390x.rpm kernel-debug-core-4.18.0-193.51.1.el8_2.s390x.rpm kernel-debug-debuginfo-4.18.0-193.51.1.el8_2.s390x.rpm kernel-debug-devel-4.18.0-193.51.1.el8_2.s390x.rpm kernel-debug-modules-4.18.0-193.51.1.el8_2.s390x.rpm kernel-debug-modules-extra-4.18.0-193.51.1.el8_2.s390x.rpm kernel-debuginfo-4.18.0-193.51.1.el8_2.s390x.rpm kernel-debuginfo-common-s390x-4.18.0-193.51.1.el8_2.s390x.rpm kernel-devel-4.18.0-193.51.1.el8_2.s390x.rpm kernel-headers-4.18.0-193.51.1.el8_2.s390x.rpm kernel-modules-4.18.0-193.51.1.el8_2.s390x.rpm kernel-modules-extra-4.18.0-193.51.1.el8_2.s390x.rpm kernel-tools-4.18.0-193.51.1.el8_2.s390x.rpm kernel-tools-debuginfo-4.18.0-193.51.1.el8_2.s390x.rpm kernel-zfcpdump-4.18.0-193.51.1.el8_2.s390x.rpm kernel-zfcpdump-core-4.18.0-193.51.1.el8_2.s390x.rpm kernel-zfcpdump-debuginfo-4.18.0-193.51.1.el8_2.s390x.rpm kernel-zfcpdump-devel-4.18.0-193.51.1.el8_2.s390x.rpm kernel-zfcpdump-modules-4.18.0-193.51.1.el8_2.s390x.rpm kernel-zfcpdump-modules-extra-4.18.0-193.51.1.el8_2.s390x.rpm perf-4.18.0-193.51.1.el8_2.s390x.rpm perf-debuginfo-4.18.0-193.51.1.el8_2.s390x.rpm python3-perf-4.18.0-193.51.1.el8_2.s390x.rpm python3-perf-debuginfo-4.18.0-193.51.1.el8_2.s390x.rpm x86_64: bpftool-4.18.0-193.51.1.el8_2.x86_64.rpm bpftool-debuginfo-4.18.0-193.51.1.el8_2.x86_64.rpm kernel-4.18.0-193.51.1.el8_2.x86_64.rpm kernel-core-4.18.0-193.51.1.el8_2.x86_64.rpm kernel-cross-headers-4.18.0-193.51.1.el8_2.x86_64.rpm kernel-debug-4.18.0-193.51.1.el8_2.x86_64.rpm kernel-debug-core-4.18.0-193.51.1.el8_2.x86_64.rpm kernel-debug-debuginfo-4.18.0-193.51.1.el8_2.x86_64.rpm kernel-debug-devel-4.18.0-193.51.1.el8_2.x86_64.rpm kernel-debug-modules-4.18.0-193.51.1.el8_2.x86_64.rpm kernel-debug-modules-extra-4.18.0-193.51.1.el8_2.x86_64.rpm kernel-debuginfo-4.18.0-193.51.1.el8_2.x86_64.rpm kernel-debuginfo-common-x86_64-4.18.0-193.51.1.el8_2.x86_64.rpm kernel-devel-4.18.0-193.51.1.el8_2.x86_64.rpm kernel-headers-4.18.0-193.51.1.el8_2.x86_64.rpm kernel-modules-4.18.0-193.51.1.el8_2.x86_64.rpm kernel-modules-extra-4.18.0-193.51.1.el8_2.x86_64.rpm kernel-tools-4.18.0-193.51.1.el8_2.x86_64.rpm kernel-tools-debuginfo-4.18.0-193.51.1.el8_2.x86_64.rpm kernel-tools-libs-4.18.0-193.51.1.el8_2.x86_64.rpm perf-4.18.0-193.51.1.el8_2.x86_64.rpm perf-debuginfo-4.18.0-193.51.1.el8_2.x86_64.rpm python3-perf-4.18.0-193.51.1.el8_2.x86_64.rpm python3-perf-debuginfo-4.18.0-193.51.1.el8_2.x86_64.rpm Red Hat CodeReady Linux Builder EUS (v. 8.2): aarch64: bpftool-debuginfo-4.18.0-193.51.1.el8_2.aarch64.rpm kernel-debug-debuginfo-4.18.0-193.51.1.el8_2.aarch64.rpm kernel-debuginfo-4.18.0-193.51.1.el8_2.aarch64.rpm kernel-debuginfo-common-aarch64-4.18.0-193.51.1.el8_2.aarch64.rpm kernel-tools-debuginfo-4.18.0-193.51.1.el8_2.aarch64.rpm kernel-tools-libs-devel-4.18.0-193.51.1.el8_2.aarch64.rpm perf-debuginfo-4.18.0-193.51.1.el8_2.aarch64.rpm python3-perf-debuginfo-4.18.0-193.51.1.el8_2.aarch64.rpm ppc64le: bpftool-debuginfo-4.18.0-193.51.1.el8_2.ppc64le.rpm kernel-debug-debuginfo-4.18.0-193.51.1.el8_2.ppc64le.rpm kernel-debuginfo-4.18.0-193.51.1.el8_2.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.18.0-193.51.1.el8_2.ppc64le.rpm kernel-tools-debuginfo-4.18.0-193.51.1.el8_2.ppc64le.rpm kernel-tools-libs-devel-4.18.0-193.51.1.el8_2.ppc64le.rpm perf-debuginfo-4.18.0-193.51.1.el8_2.ppc64le.rpm python3-perf-debuginfo-4.18.0-193.51.1.el8_2.ppc64le.rpm x86_64: bpftool-debuginfo-4.18.0-193.51.1.el8_2.x86_64.rpm kernel-debug-debuginfo-4.18.0-193.51.1.el8_2.x86_64.rpm kernel-debuginfo-4.18.0-193.51.1.el8_2.x86_64.rpm kernel-debuginfo-common-x86_64-4.18.0-193.51.1.el8_2.x86_64.rpm kernel-tools-debuginfo-4.18.0-193.51.1.el8_2.x86_64.rpm kernel-tools-libs-devel-4.18.0-193.51.1.el8_2.x86_64.rpm perf-debuginfo-4.18.0-193.51.1.el8_2.x86_64.rpm python3-perf-debuginfo-4.18.0-193.51.1.el8_2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2021-3347 https://access.redhat.com/security/cve/CVE-2021-27363 https://access.redhat.com/security/cve/CVE-2021-27364 https://access.redhat.com/security/cve/CVE-2021-27365 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYH7U19zjgjWX9erEAQg+fg/+JMZC3jCnmmsPYlffgIe96rR5+HJZ55ic dbaHM3i1X1kGIYxjWgX8L3b+cMYRpfxZpasXMmgvEn93ml7BiD2Bx7VpQ05Wdo2D zLlfh7G/P9IBe4Fk97sz0lYkp1rgdU8TxpCqO84X9mrBTKU3TU27bLWNJ8/DDPwW F6gkwiGIsNmiEpbRE2Y8uvULpH+7anKfWrSdw4rtDKJ2jQcI1PguEaCL/VrxtpGW UZ1Tlv3AemqKz9gsChPQFnDPW+cgPW2j9Nh42oJFxbmfzXRvEQ/7tupVmjlrAh+9 M5sL4P4OFnE6yV76R5i0ZJ2Tfw6SoOu1HUot2p8y1O+POoiX5H5lNTDejl6H82Gy O9ZQ58y3ZLniTtOPt7xdI36KZQm/Lr0tGLsEw7DDprRxYekPQ7cVpbgN6D5PvNOb EAuA4pF0JLObF4MwhY33UIQvfNH6WV2Wbq87LnypzDwmRUeYLWhg5orlF33kz8pR PBF/E/Z/vOJF7yuxROvFHDnNEPmps2wcJqdf1UdE0QD29F2biQ4MhCicCwiFwFGH wxFHdykdoZY9URt7TjvgOaaHuZKoyrzcJTpzqxijxJFVNEhqQEnHMyIEQSKTesz6 NsyeTS1R8S0sig608M/GoKj4ODenJAIo14ZLGa+sYsadBXlf+gyiCqM38eMMMsJe V5/znOSDjsI= =sqZK -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . Bug Fix(es): * Upstream Patch for Gracefully handle DMAR units with no supported address widthsx86/vt-d (BZ#1932201) * RHEL8.1 Alpha - ISST-LTE:PNV:Witherspoon-DD2.3:woo: KDUMP hang during shutdown, lpfc loses connection to disks (rootdisk:nvme) (BZ#1934306) 4. Bug Fix(es): * Enable CI and changelog for GitLab workflow (BZ#1930934) 4

Trust: 2.16

sources: NVD: CVE-2021-27363 // JVNDB: JVNDB-2021-004361 // VULHUB: VHN-386598 // PACKETSTORM: 162246 // PACKETSTORM: 162247 // PACKETSTORM: 162156 // PACKETSTORM: 162255 // PACKETSTORM: 162112

AFFECTED PRODUCTS

vendor:linuxmodel:kernelscope:lteversion:5.11.3

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:netappmodel:solidfire baseboard management controllerscope:eqversion: -

Trust: 1.0

vendor:netappmodel:cloud backupscope:eqversion: -

Trust: 1.0

vendor:debianmodel:gnu/linuxscope: - version: -

Trust: 0.8

vendor:linuxmodel:kernelscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-004361 // NVD: CVE-2021-27363

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-27363
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-27363
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202103-523
value: MEDIUM

Trust: 0.6

VULHUB: VHN-386598
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2021-27363
severity: LOW
baseScore: 3.6
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-386598
severity: LOW
baseScore: 3.6
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-27363
baseSeverity: MEDIUM
baseScore: 4.4
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: LOW
exploitabilityScore: 1.8
impactScore: 2.5
version: 3.1

Trust: 1.0

NVD: CVE-2021-27363
baseSeverity: MEDIUM
baseScore: 4.4
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: LOW
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-386598 // JVNDB: JVNDB-2021-004361 // CNNVD: CNNVD-202103-523 // NVD: CVE-2021-27363

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:Lack of information (CWE-noinfo) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-004361 // NVD: CVE-2021-27363

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202103-523

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202103-523

PATCH

title:iscsiurl:https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html

Trust: 0.8

sources: JVNDB: JVNDB-2021-004361

EXTERNAL IDS

db:NVDid:CVE-2021-27363

Trust: 3.0

db:OPENWALLid:OSS-SECURITY/2021/03/06/1

Trust: 2.5

db:PACKETSTORMid:162117

Trust: 1.7

db:JVNDBid:JVNDB-2021-004361

Trust: 0.8

db:PACKETSTORMid:161952

Trust: 0.7

db:PACKETSTORMid:162341

Trust: 0.7

db:PACKETSTORMid:162478

Trust: 0.7

db:PACKETSTORMid:162095

Trust: 0.7

db:PACKETSTORMid:162528

Trust: 0.7

db:PACKETSTORMid:162151

Trust: 0.7

db:PACKETSTORMid:161909

Trust: 0.7

db:PACKETSTORMid:162383

Trust: 0.7

db:PACKETSTORMid:162108

Trust: 0.7

db:PACKETSTORMid:162242

Trust: 0.7

db:PACKETSTORMid:162337

Trust: 0.7

db:CNNVDid:CNNVD-202103-523

Trust: 0.7

db:AUSCERTid:ESB-2021.1589

Trust: 0.6

db:AUSCERTid:ESB-2021.1694

Trust: 0.6

db:AUSCERTid:ESB-2021.1655

Trust: 0.6

db:AUSCERTid:ESB-2021.0837

Trust: 0.6

db:AUSCERTid:ESB-2021.1406

Trust: 0.6

db:AUSCERTid:ESB-2021.1339

Trust: 0.6

db:AUSCERTid:ESB-2021.1224

Trust: 0.6

db:AUSCERTid:ESB-2021.1307

Trust: 0.6

db:AUSCERTid:ESB-2021.1184

Trust: 0.6

db:AUSCERTid:ESB-2021.1002

Trust: 0.6

db:AUSCERTid:ESB-2021.2589

Trust: 0.6

db:AUSCERTid:ESB-2022.3346

Trust: 0.6

db:AUSCERTid:ESB-2021.1558

Trust: 0.6

db:AUSCERTid:ESB-2021.1299

Trust: 0.6

db:AUSCERTid:ESB-2021.1635

Trust: 0.6

db:AUSCERTid:ESB-2021.2136

Trust: 0.6

db:AUSCERTid:ESB-2021.1445

Trust: 0.6

db:AUSCERTid:ESB-2021.0981

Trust: 0.6

db:AUSCERTid:ESB-2021.1212

Trust: 0.6

db:AUSCERTid:ESB-2021.1151

Trust: 0.6

db:AUSCERTid:ESB-2021.1669

Trust: 0.6

db:AUSCERTid:ESB-2021.2781

Trust: 0.6

db:AUSCERTid:ESB-2021.1101

Trust: 0.6

db:CS-HELPid:SB2021051001

Trust: 0.6

db:CS-HELPid:SB2021042828

Trust: 0.6

db:CS-HELPid:SB2021050609

Trust: 0.6

db:CS-HELPid:SB2021041608

Trust: 0.6

db:CS-HELPid:SB2021041223

Trust: 0.6

db:CS-HELPid:SB2021051317

Trust: 0.6

db:CS-HELPid:SB2021042136

Trust: 0.6

db:PACKETSTORMid:162246

Trust: 0.2

db:PACKETSTORMid:162156

Trust: 0.2

db:PACKETSTORMid:162247

Trust: 0.2

db:PACKETSTORMid:162255

Trust: 0.2

db:PACKETSTORMid:162112

Trust: 0.2

db:PACKETSTORMid:162115

Trust: 0.1

db:PACKETSTORMid:161973

Trust: 0.1

db:PACKETSTORMid:162098

Trust: 0.1

db:PACKETSTORMid:162346

Trust: 0.1

db:VULHUBid:VHN-386598

Trust: 0.1

sources: VULHUB: VHN-386598 // PACKETSTORM: 162246 // PACKETSTORM: 162247 // PACKETSTORM: 162156 // PACKETSTORM: 162255 // PACKETSTORM: 162112 // JVNDB: JVNDB-2021-004361 // CNNVD: CNNVD-202103-523 // NVD: CVE-2021-27363

REFERENCES

url:http://www.openwall.com/lists/oss-security/2021/03/06/1

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2021-27363

Trust: 1.9

url:https://security.netapp.com/advisory/ntap-20210409-0001/

Trust: 1.7

url:http://packetstormsecurity.com/files/162117/kernel-live-patch-security-notice-lsn-0075-1.html

Trust: 1.7

url:https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html

Trust: 1.7

url:https://bugzilla.suse.com/show_bug.cgi?id=1182716

Trust: 1.7

url:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=688e8128b7a92df982709a4137ea4588d16f24aa

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html

Trust: 1.7

url:https://access.redhat.com/security/cve/cve-2021-27363

Trust: 1.1

url:https://www.auscert.org.au/bulletins/esb-2021.0837

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021051001

Trust: 0.6

url:https://packetstormsecurity.com/files/162095/red-hat-security-advisory-2021-1070-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1589

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1445

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1307

Trust: 0.6

url:https://packetstormsecurity.com/files/162242/red-hat-security-advisory-2021-1267-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1406

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021042828

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1669

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2781

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1151

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0981

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1212

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021041223

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021042136

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1299

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1694

Trust: 0.6

url:https://packetstormsecurity.com/files/161952/ubuntu-security-notice-usn-4887-1.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021051317

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3346

Trust: 0.6

url:https://packetstormsecurity.com/files/161909/ubuntu-security-notice-usn-4883-1.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021050609

Trust: 0.6

url:https://packetstormsecurity.com/files/162341/red-hat-security-advisory-2021-1373-01.html

Trust: 0.6

url:https://vigilance.fr/vulnerability/linux-kernel-read-write-access-via-iscsi-show-transport-handle-34762

Trust: 0.6

url:https://packetstormsecurity.com/files/162108/red-hat-security-advisory-2021-1081-01.html

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-data-risk-manager-is-affected-by-multiple-vulnerabilities-4/

Trust: 0.6

url:https://packetstormsecurity.com/files/162151/red-hat-security-advisory-2021-1168-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/162478/red-hat-security-advisory-2021-1429-01.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021041608

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1558

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1635

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1655

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2589

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1339

Trust: 0.6

url:https://packetstormsecurity.com/files/162337/red-hat-security-advisory-2021-1369-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1184

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1224

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2136

Trust: 0.6

url:https://www.ibm.com/support/pages/node/6525030

Trust: 0.6

url:https://packetstormsecurity.com/files/162528/red-hat-security-advisory-2021-1531-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1002

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1101

Trust: 0.6

url:https://packetstormsecurity.com/files/162383/red-hat-security-advisory-2021-1448-01.html

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-qradar-network-packet-capture-is-vulnerable-to-using-components-with-known-vulnerabilities-2/

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2021-27364

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2021-27364

Trust: 0.5

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2021-27365

Trust: 0.5

url:https://bugzilla.redhat.com/):

Trust: 0.5

url:https://access.redhat.com/security/team/key/

Trust: 0.5

url:https://access.redhat.com/articles/11258

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2021-27365

Trust: 0.5

url:https://access.redhat.com/security/team/contact/

Trust: 0.5

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2021-3347

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-3347

Trust: 0.3

url:https://access.redhat.com/errata/rhsa-2021:1279

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:1272

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:1171

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:1289

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-28374

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:1093

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-26708

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-0466

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-27152

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27152

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-0466

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-28374

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-26708

Trust: 0.1

sources: VULHUB: VHN-386598 // PACKETSTORM: 162246 // PACKETSTORM: 162247 // PACKETSTORM: 162156 // PACKETSTORM: 162255 // PACKETSTORM: 162112 // JVNDB: JVNDB-2021-004361 // CNNVD: CNNVD-202103-523 // NVD: CVE-2021-27363

CREDITS

Red Hat

Trust: 1.1

sources: PACKETSTORM: 162246 // PACKETSTORM: 162247 // PACKETSTORM: 162156 // PACKETSTORM: 162255 // PACKETSTORM: 162112 // CNNVD: CNNVD-202103-523

SOURCES

db:VULHUBid:VHN-386598
db:PACKETSTORMid:162246
db:PACKETSTORMid:162247
db:PACKETSTORMid:162156
db:PACKETSTORMid:162255
db:PACKETSTORMid:162112
db:JVNDBid:JVNDB-2021-004361
db:CNNVDid:CNNVD-202103-523
db:NVDid:CVE-2021-27363

LAST UPDATE DATE

2025-08-11T21:47:08.206000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-386598date:2022-05-23T00:00:00
db:JVNDBid:JVNDB-2021-004361date:2021-11-18T09:07:00
db:CNNVDid:CNNVD-202103-523date:2022-07-11T00:00:00
db:NVDid:CVE-2021-27363date:2024-11-21T05:57:50.513

SOURCES RELEASE DATE

db:VULHUBid:VHN-386598date:2021-03-07T00:00:00
db:PACKETSTORMid:162246date:2021-04-20T16:17:42
db:PACKETSTORMid:162247date:2021-04-20T16:18:26
db:PACKETSTORMid:162156date:2021-04-13T15:49:34
db:PACKETSTORMid:162255date:2021-04-20T16:32:38
db:PACKETSTORMid:162112date:2021-04-07T20:08:52
db:JVNDBid:JVNDB-2021-004361date:2021-11-18T00:00:00
db:CNNVDid:CNNVD-202103-523date:2021-03-05T00:00:00
db:NVDid:CVE-2021-27363date:2021-03-07T04:15:13.330