var-202103-0920
Vulnerability from variot

An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport's handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module's global variables. Linux Kernel Contains an unspecified vulnerability.Information is obtained and denial of service (DoS) It may be put into a state. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

===================================================================== Red Hat Security Advisory

Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2021:1267-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:1267 Issue date: 2021-04-20 CVE Names: CVE-2020-14351 CVE-2021-27363 CVE-2021-27364 CVE-2021-27365 =====================================================================

  1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support, Red Hat Enterprise Linux 7.4 Telco Extended Update Support, and Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux Server AUS (v. 7.4) - noarch, x86_64 Red Hat Enterprise Linux Server E4S (v. 7.4) - noarch, ppc64le, x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 7.4) - x86_64 Red Hat Enterprise Linux Server Optional E4S (v. 7.4) - ppc64le, x86_64 Red Hat Enterprise Linux Server Optional TUS (v. 7.4) - x86_64 Red Hat Enterprise Linux Server TUS (v. 7.4) - noarch, x86_64

Security Fix(es):

  • kernel: out-of-bounds read in libiscsi module (CVE-2021-27364)

  • kernel: heap buffer overflow in the iSCSI subsystem (CVE-2021-27365)

  • kernel: performance counters race condition use-after-free (CVE-2020-14351)

  • kernel: iscsi: unrestricted access to sessions and handles (CVE-2021-27363)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • Enable CI and changelog for GitLab workflow (BZ#1930932)

  • Solution:

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

  1. Bugs fixed (https://bugzilla.redhat.com/):

1862849 - CVE-2020-14351 kernel: performance counters race condition use-after-free 1930078 - CVE-2021-27365 kernel: heap buffer overflow in the iSCSI subsystem 1930079 - CVE-2021-27363 kernel: iscsi: unrestricted access to sessions and handles 1930080 - CVE-2021-27364 kernel: out-of-bounds read in libiscsi module

  1. Package List:

Red Hat Enterprise Linux Server AUS (v. 7.4):

Source: kernel-3.10.0-693.84.1.el7.src.rpm

noarch: kernel-abi-whitelists-3.10.0-693.84.1.el7.noarch.rpm kernel-doc-3.10.0-693.84.1.el7.noarch.rpm

x86_64: kernel-3.10.0-693.84.1.el7.x86_64.rpm kernel-debug-3.10.0-693.84.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-693.84.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.84.1.el7.x86_64.rpm kernel-devel-3.10.0-693.84.1.el7.x86_64.rpm kernel-headers-3.10.0-693.84.1.el7.x86_64.rpm kernel-tools-3.10.0-693.84.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-693.84.1.el7.x86_64.rpm perf-3.10.0-693.84.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm python-perf-3.10.0-693.84.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm

Red Hat Enterprise Linux Server E4S (v. 7.4):

Source: kernel-3.10.0-693.84.1.el7.src.rpm

noarch: kernel-abi-whitelists-3.10.0-693.84.1.el7.noarch.rpm kernel-doc-3.10.0-693.84.1.el7.noarch.rpm

ppc64le: kernel-3.10.0-693.84.1.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-693.84.1.el7.ppc64le.rpm kernel-debug-3.10.0-693.84.1.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-693.84.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-693.84.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-693.84.1.el7.ppc64le.rpm kernel-devel-3.10.0-693.84.1.el7.ppc64le.rpm kernel-headers-3.10.0-693.84.1.el7.ppc64le.rpm kernel-tools-3.10.0-693.84.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-693.84.1.el7.ppc64le.rpm kernel-tools-libs-3.10.0-693.84.1.el7.ppc64le.rpm perf-3.10.0-693.84.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-693.84.1.el7.ppc64le.rpm python-perf-3.10.0-693.84.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-693.84.1.el7.ppc64le.rpm

x86_64: kernel-3.10.0-693.84.1.el7.x86_64.rpm kernel-debug-3.10.0-693.84.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-693.84.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.84.1.el7.x86_64.rpm kernel-devel-3.10.0-693.84.1.el7.x86_64.rpm kernel-headers-3.10.0-693.84.1.el7.x86_64.rpm kernel-tools-3.10.0-693.84.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-693.84.1.el7.x86_64.rpm perf-3.10.0-693.84.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm python-perf-3.10.0-693.84.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm

Red Hat Enterprise Linux Server TUS (v. 7.4):

Source: kernel-3.10.0-693.84.1.el7.src.rpm

noarch: kernel-abi-whitelists-3.10.0-693.84.1.el7.noarch.rpm kernel-doc-3.10.0-693.84.1.el7.noarch.rpm

x86_64: kernel-3.10.0-693.84.1.el7.x86_64.rpm kernel-debug-3.10.0-693.84.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-693.84.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.84.1.el7.x86_64.rpm kernel-devel-3.10.0-693.84.1.el7.x86_64.rpm kernel-headers-3.10.0-693.84.1.el7.x86_64.rpm kernel-tools-3.10.0-693.84.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-693.84.1.el7.x86_64.rpm perf-3.10.0-693.84.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm python-perf-3.10.0-693.84.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm

Red Hat Enterprise Linux Server Optional AUS (v. 7.4):

x86_64: kernel-debug-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.84.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-693.84.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm

Red Hat Enterprise Linux Server Optional E4S (v. 7.4):

ppc64le: kernel-debug-debuginfo-3.10.0-693.84.1.el7.ppc64le.rpm kernel-debug-devel-3.10.0-693.84.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-693.84.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-693.84.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-693.84.1.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-693.84.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-693.84.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-693.84.1.el7.ppc64le.rpm

x86_64: kernel-debug-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.84.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-693.84.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm

Red Hat Enterprise Linux Server Optional TUS (v. 7.4):

x86_64: kernel-debug-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.84.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-693.84.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2020-14351 https://access.redhat.com/security/cve/CVE-2021-27363 https://access.redhat.com/security/cve/CVE-2021-27364 https://access.redhat.com/security/cve/CVE-2021-27365 https://access.redhat.com/security/updates/classification/#important

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iQIVAwUBYH7PN9zjgjWX9erEAQj00Q//dwJUA3XoZ8Ferzd26sJ/DcX6mUEUBmHR ak7tX27vETn/72UdgkHJkB0XRqsn6yjQBdowxXQe7zdcmnPFemMlluDzwNnNw2ME FqLcIPgWI7qct32+csGDvOfUDz912A+Sc9XB2oekMpXgeMunfxz3FfmocZPVKcqh OJq9MTkjJcktHOKvwr40xnYKk/0cKUqcjqQxGZbYCr0RZ3u88vHd8JIDZqmBr+dk tYHIs5lIZ2jICescQf9nwQByB4jm8BX7WDqmdyvV8jrrRzVYhLyFZdDDo9nosDVK 4y++m9pLVqHtkojPscbn2+NBEDHJxUmtFn5JabSLb51Jog0tGu+QC5MEtfqc5jgH Cn/M47TR6OiB88i8FdQva40HWGsEQanZaLeNWRGEh+AaVZt0WD7zgzAbKghZ8iLY EypWscF8RYcEN27Q6DNcWwozLyfWGbH3Sex4OMsPL1jqtki0+6HD/ezI6HDmnHy0 4FuCbavgKBRuHHZXG7jX/rN6FHMg/7My4LSHk9fmj2PszaTyZZpFqz0mcBCMJzNX rbgPNtvbOpjv4sUn22LNNA77lOGw+cKwXIU0FKwDBXx+Ak7riGn2l6OpTReUa3qj Eck9dxJiZAzSNunG9HN8dBXUprcuo2WYJ4TV+KwxCLQbQbOkrnHD6bSHXRv70bxK HUMRmNWYCrM= =INXh -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . Description:

Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. See the following advisory for the container images for this release:

https://access.redhat.com/errata/RHBA-2021:1427

All OpenShift Container Platform 4.6 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at

https://docs.openshift.com/container-platform/4.6/updating/updating-cluster - -between-minor.html#understanding-upgrade-channels_updating-cluster-between - -minor

  1. Solution:

For OpenShift Container Platform 4.6 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:

https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-rel ease-notes.html

Details on how to access this content are available at https://docs.openshift.com/container-platform/4.6/updating/updating-cluster - -cli.html

  1. Bugs fixed (https://bugzilla.redhat.com/):

1887664 - CVE-2020-25649 jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE) 1941768 - Reports that has specified a retention should not be requeued in the sync handler 1954163 - Placeholder bug for OCP 4.6.0 extras release

  1. Description:

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Bug Fix(es):

  • RHEL7.9 Realtime crashes due to a blocked task detection. The blocked task is stuck in unregister_shrinker() where multiple tasks have taken the shrinker_rwsem and are fighting on a dentry's d_lockref lock rt_mutex. [kernel-rt] (BZ#1935557)

  • kernel-rt: update to the latest RHEL7.9.z5 source tree (BZ#1939220)

  • 8) - x86_64

  • 8) - aarch64, noarch, ppc64le, s390x, x86_64

Bug Fix(es):

  • race condition when creating child sockets from syncookies (BZ#1915529)

  • On System Z, a hash needs state randomized for entropy extraction (BZ#1915816)

  • scsi: target: core_tmr_abort_task() reporting multiple aborts for the same se_cmd->tag (BZ#1918354)

  • [mlx5] VF interface stats are not reflected in "ip -s link show" / "ifconfig " commands (BZ#1921060)

  • Win10 guest automatic reboot after migration in Win10 and WSL2 on Intel hosts (BZ#1923281)

  • [RHEL 8.3] Repeated messages - Unable to burst-read optrom segment (BZ#1924222)

  • Backport bug fix RDMA/umem: Prevent small pages from being returned by ib_umem_find_best_pgsz (BZ#1924691)

  • [Cisco 8.3] RHEL/Cent 8.2 fNIC driver needs a patch fix that addresses crash (BZ#1925186)

  • RHEL8.3 - The kernel misdetects zCX with z/VM (BZ#1925508)

  • Backport 22e4663e91 ("mm/slub: fix panic in slab_alloc_node()") (BZ#1925511)

  • SCTP "Address already in use" when no active endpoints from RHEL 8.2 onwards (BZ#1927521)

  • lpfc: Fix initial FLOGI failure due to BBSCN not supported (BZ#1927921)

  • [mm] mm, oom: remove oom_lock from oom_reaper (BZ#1929738)

  • Unexpected thread movement with AMD Milan compared to Rome (BZ#1929740)

  • rpmbuild cannot build the userspace RPMs in the kernel package when the kernel itself is not built (BZ#1929910)

  • [Regression] RHEL8.2 - ISST-LTE:pVM:diapvmlp83:sum:memory DLPAR fails to add memory on multiple trials[mm/memory_hotplug.c:1163] (mm-) (BZ#1930168)

  • Configuring the system with non-RT kernel will hang the system (BZ#1930735)

  • Upstream Patch for Gracefully handle DMAR units with no supported address widthsx86/vt-d (BZ#1932199)

  • gfs2: Deadlock between gfs2_{create_inode,inode_lookup} and delete_work_func (BZ#1937109)

  • Failing on tsx-ctrl when the flag doesn't change anything (BZ#1939013)

Enhancement(s):

  • RFE: Backport all Audit enhancements and fixes up to version 5.10-rc1 (BZ#1907520)

  • RHEL8.4: Update the target driver (BZ#1918363)

  • [Mellanox 8.4 FEAT] mlx5: Hairpin Support in Switch Mode (BZ#1924689)

  • ========================================================================== Ubuntu Security Notice USN-4883-1 March 20, 2021

linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-gcp, linux-gcp-4.15, linux-hwe, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities ==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 ESM

Summary:

Several security issues were fixed in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-27365)

Adam Nichols discovered that the iSCSI subsystem in the Linux kernel did not properly restrict access to iSCSI transport handles. A local attacker could use this to cause a denial of service or expose sensitive information (kernel pointer addresses). A local attacker could use this to cause a denial of service (system crash) or expose sensitive information (kernel memory). (CVE-2021-27364)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 18.04 LTS: linux-image-4.15.0-1081-raspi2 4.15.0-1081.86 linux-image-4.15.0-1087-kvm 4.15.0-1087.89 linux-image-4.15.0-1095-gcp 4.15.0-1095.108 linux-image-4.15.0-1096-aws 4.15.0-1096.103 linux-image-4.15.0-1098-snapdragon 4.15.0-1098.107 linux-image-4.15.0-1110-azure 4.15.0-1110.122 linux-image-4.15.0-139-generic 4.15.0-139.143 linux-image-4.15.0-139-generic-lpae 4.15.0-139.143 linux-image-4.15.0-139-lowlatency 4.15.0-139.143 linux-image-aws-lts-18.04 4.15.0.1096.99 linux-image-azure-lts-18.04 4.15.0.1110.83 linux-image-gcp-lts-18.04 4.15.0.1095.113 linux-image-generic 4.15.0.139.126 linux-image-generic-lpae 4.15.0.139.126 linux-image-kvm 4.15.0.1087.83 linux-image-lowlatency 4.15.0.139.126 linux-image-powerpc-e500mc 4.15.0.139.126 linux-image-powerpc-smp 4.15.0.139.126 linux-image-powerpc64-emb 4.15.0.139.126 linux-image-powerpc64-smp 4.15.0.139.126 linux-image-raspi2 4.15.0.1081.78 linux-image-snapdragon 4.15.0.1098.101 linux-image-virtual 4.15.0.139.126

Ubuntu 16.04 LTS: linux-image-4.15.0-1095-gcp 4.15.0-1095.108~16.04.1 linux-image-4.15.0-1096-aws 4.15.0-1096.103~16.04.1 linux-image-4.15.0-1110-azure 4.15.0-1110.122~16.04.1 linux-image-4.15.0-139-generic 4.15.0-139.143~16.04.1 linux-image-4.15.0-139-generic-lpae 4.15.0-139.143~16.04.1 linux-image-4.15.0-139-lowlatency 4.15.0-139.143~16.04.1 linux-image-4.4.0-1090-kvm 4.4.0-1090.99 linux-image-4.4.0-1124-aws 4.4.0-1124.138 linux-image-4.4.0-1152-snapdragon 4.4.0-1152.162 linux-image-4.4.0-206-generic 4.4.0-206.238 linux-image-4.4.0-206-generic-lpae 4.4.0-206.238 linux-image-4.4.0-206-lowlatency 4.4.0-206.238 linux-image-4.4.0-206-powerpc-e500mc 4.4.0-206.238 linux-image-4.4.0-206-powerpc-smp 4.4.0-206.238 linux-image-4.4.0-206-powerpc64-emb 4.4.0-206.238 linux-image-4.4.0-206-powerpc64-smp 4.4.0-206.238 linux-image-aws 4.4.0.1124.129 linux-image-aws-hwe 4.15.0.1096.89 linux-image-azure 4.15.0.1110.101 linux-image-azure-edge 4.15.0.1110.101 linux-image-gcp 4.15.0.1095.96 linux-image-generic 4.4.0.206.212 linux-image-generic-hwe-16.04 4.15.0.139.134 linux-image-generic-lpae 4.4.0.206.212 linux-image-generic-lpae-hwe-16.04 4.15.0.139.134 linux-image-gke 4.15.0.1095.96 linux-image-kvm 4.4.0.1090.88 linux-image-lowlatency 4.4.0.206.212 linux-image-lowlatency-hwe-16.04 4.15.0.139.134 linux-image-oem 4.15.0.139.134 linux-image-powerpc-e500mc 4.4.0.206.212 linux-image-powerpc-smp 4.4.0.206.212 linux-image-powerpc64-emb 4.4.0.206.212 linux-image-powerpc64-smp 4.4.0.206.212 linux-image-snapdragon 4.4.0.1152.144 linux-image-virtual 4.4.0.206.212 linux-image-virtual-hwe-16.04 4.15.0.139.134

Ubuntu 14.04 ESM: linux-image-4.15.0-1110-azure 4.15.0-1110.122~14.04.1 linux-image-4.4.0-1088-aws 4.4.0-1088.92 linux-image-aws 4.4.0.1088.85 linux-image-azure 4.15.0.1110.83

After a standard system update you need to reboot your computer to make all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202103-0920",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "cloud backup",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "kernel",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "linux",
        "version": "5.11.3"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "9.0"
      },
      {
        "model": "solidfire baseboard management controller",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "gnu/linux",
        "scope": null,
        "trust": 0.8,
        "vendor": "debian",
        "version": null
      },
      {
        "model": "kernel",
        "scope": null,
        "trust": 0.8,
        "vendor": "linux",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-004361"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-27363"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Red Hat",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "162242"
      },
      {
        "db": "PACKETSTORM",
        "id": "162246"
      },
      {
        "db": "PACKETSTORM",
        "id": "162478"
      },
      {
        "db": "PACKETSTORM",
        "id": "162095"
      },
      {
        "db": "PACKETSTORM",
        "id": "162108"
      },
      {
        "db": "PACKETSTORM",
        "id": "162112"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202103-523"
      }
    ],
    "trust": 1.2
  },
  "cve": "CVE-2021-27363",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 3.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CVE-2021-27363",
            "impactScore": 4.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 1.8,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 3.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "VHN-386598",
            "impactScore": 4.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "LOW",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 1.8,
            "id": "CVE-2021-27363",
            "impactScore": 2.5,
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "NVD",
            "availabilityImpact": "Low",
            "baseScore": 4.4,
            "baseSeverity": "Medium",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "CVE-2021-27363",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2021-27363",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2021-27363",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202103-523",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-386598",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-386598"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-004361"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202103-523"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-27363"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport\u0027s handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module\u0027s global variables. Linux Kernel Contains an unspecified vulnerability.Information is obtained and denial of service (DoS) It may be put into a state. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Important: kernel security and bug fix update\nAdvisory ID:       RHSA-2021:1267-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://access.redhat.com/errata/RHSA-2021:1267\nIssue date:        2021-04-20\nCVE Names:         CVE-2020-14351 CVE-2021-27363 CVE-2021-27364 \n                   CVE-2021-27365 \n=====================================================================\n\n1. Summary:\n\nAn update for kernel is now available for Red Hat Enterprise Linux 7.4\nAdvanced Update Support, Red Hat Enterprise Linux 7.4 Telco Extended Update\nSupport, and Red Hat Enterprise Linux 7.4 Update Services for SAP\nSolutions. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Server AUS (v. 7.4) - noarch, x86_64\nRed Hat Enterprise Linux Server E4S (v. 7.4) - noarch, ppc64le, x86_64\nRed Hat Enterprise Linux Server Optional AUS (v. 7.4) - x86_64\nRed Hat Enterprise Linux Server Optional E4S (v. 7.4) - ppc64le, x86_64\nRed Hat Enterprise Linux Server Optional TUS (v. 7.4) - x86_64\nRed Hat Enterprise Linux Server TUS (v. 7.4) - noarch, x86_64\n\n3. \n\nSecurity Fix(es):\n\n* kernel: out-of-bounds read in libiscsi module (CVE-2021-27364)\n\n* kernel: heap buffer overflow in the iSCSI subsystem (CVE-2021-27365)\n\n* kernel: performance counters race condition use-after-free\n(CVE-2020-14351)\n\n* kernel: iscsi: unrestricted access to sessions and handles\n(CVE-2021-27363)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\nBug Fix(es):\n\n* Enable CI and changelog for GitLab workflow (BZ#1930932)\n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1862849 - CVE-2020-14351 kernel: performance counters race condition use-after-free\n1930078 - CVE-2021-27365 kernel: heap buffer overflow in the iSCSI subsystem\n1930079 - CVE-2021-27363 kernel: iscsi: unrestricted access to sessions and handles\n1930080 - CVE-2021-27364 kernel: out-of-bounds read in libiscsi module\n\n6. Package List:\n\nRed Hat Enterprise Linux Server AUS (v. 7.4):\n\nSource:\nkernel-3.10.0-693.84.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-693.84.1.el7.noarch.rpm\nkernel-doc-3.10.0-693.84.1.el7.noarch.rpm\n\nx86_64:\nkernel-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-debug-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-devel-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-headers-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-tools-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-693.84.1.el7.x86_64.rpm\nperf-3.10.0-693.84.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm\npython-perf-3.10.0-693.84.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server E4S (v. 7.4):\n\nSource:\nkernel-3.10.0-693.84.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-693.84.1.el7.noarch.rpm\nkernel-doc-3.10.0-693.84.1.el7.noarch.rpm\n\nppc64le:\nkernel-3.10.0-693.84.1.el7.ppc64le.rpm\nkernel-bootwrapper-3.10.0-693.84.1.el7.ppc64le.rpm\nkernel-debug-3.10.0-693.84.1.el7.ppc64le.rpm\nkernel-debug-debuginfo-3.10.0-693.84.1.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-693.84.1.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-693.84.1.el7.ppc64le.rpm\nkernel-devel-3.10.0-693.84.1.el7.ppc64le.rpm\nkernel-headers-3.10.0-693.84.1.el7.ppc64le.rpm\nkernel-tools-3.10.0-693.84.1.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-693.84.1.el7.ppc64le.rpm\nkernel-tools-libs-3.10.0-693.84.1.el7.ppc64le.rpm\nperf-3.10.0-693.84.1.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-693.84.1.el7.ppc64le.rpm\npython-perf-3.10.0-693.84.1.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-693.84.1.el7.ppc64le.rpm\n\nx86_64:\nkernel-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-debug-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-devel-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-headers-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-tools-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-693.84.1.el7.x86_64.rpm\nperf-3.10.0-693.84.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm\npython-perf-3.10.0-693.84.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server TUS (v. 7.4):\n\nSource:\nkernel-3.10.0-693.84.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-693.84.1.el7.noarch.rpm\nkernel-doc-3.10.0-693.84.1.el7.noarch.rpm\n\nx86_64:\nkernel-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-debug-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-devel-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-headers-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-tools-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-693.84.1.el7.x86_64.rpm\nperf-3.10.0-693.84.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm\npython-perf-3.10.0-693.84.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional AUS (v. 7.4):\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-693.84.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional E4S (v. 7.4):\n\nppc64le:\nkernel-debug-debuginfo-3.10.0-693.84.1.el7.ppc64le.rpm\nkernel-debug-devel-3.10.0-693.84.1.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-693.84.1.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-693.84.1.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-693.84.1.el7.ppc64le.rpm\nkernel-tools-libs-devel-3.10.0-693.84.1.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-693.84.1.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-693.84.1.el7.ppc64le.rpm\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-693.84.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional TUS (v. 7.4):\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-693.84.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-693.84.1.el7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2020-14351\nhttps://access.redhat.com/security/cve/CVE-2021-27363\nhttps://access.redhat.com/security/cve/CVE-2021-27364\nhttps://access.redhat.com/security/cve/CVE-2021-27365\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2021 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nHUMRmNWYCrM=\n=INXh\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n. Description:\n\nRed Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2021:1427\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\n\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster\n- -between-minor.html#understanding-upgrade-channels_updating-cluster-between\n- -minor\n\n3. Solution:\n\nFor OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-rel\nease-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster\n- -cli.html\n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n1887664 - CVE-2020-25649 jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)\n1941768 - Reports that has specified a retention should not be requeued in the sync handler\n1954163 - Placeholder bug for OCP 4.6.0 extras release\n\n5. Description:\n\nThe kernel-rt packages provide the Real Time Linux Kernel, which enables\nfine-tuning for systems with extremely high determinism requirements. \n\nBug Fix(es):\n\n* RHEL7.9 Realtime crashes due to a blocked task detection. The blocked\ntask is stuck in unregister_shrinker() where multiple tasks have taken the\nshrinker_rwsem and are fighting on a dentry\u0027s d_lockref lock rt_mutex. \n[kernel-rt] (BZ#1935557)\n\n* kernel-rt: update to the latest RHEL7.9.z5 source tree (BZ#1939220)\n\n4. 8) - x86_64\n\n3. 8) - aarch64, noarch, ppc64le, s390x, x86_64\n\n3. \n\nBug Fix(es):\n\n* race condition when creating child sockets from syncookies (BZ#1915529)\n\n* On System Z, a hash needs state randomized for entropy extraction\n(BZ#1915816)\n\n* scsi: target: core_tmr_abort_task() reporting multiple aborts for the\nsame se_cmd-\u003etag (BZ#1918354)\n\n* [mlx5] VF interface stats are not reflected in \"ip -s link show\" /\n\"ifconfig \u003cvf\u003e\" commands (BZ#1921060)\n\n* Win10 guest automatic reboot after migration in Win10 and WSL2 on Intel\nhosts (BZ#1923281)\n\n* [RHEL 8.3] Repeated messages - Unable to burst-read optrom segment\n(BZ#1924222)\n\n* Backport bug fix RDMA/umem: Prevent small pages from being returned by\nib_umem_find_best_pgsz (BZ#1924691)\n\n* [Cisco 8.3] RHEL/Cent 8.2 fNIC driver needs a patch fix that addresses\ncrash (BZ#1925186)\n\n* RHEL8.3 - The kernel misdetects zCX with z/VM (BZ#1925508)\n\n* Backport 22e4663e91 (\"mm/slub: fix panic in slab_alloc_node()\")\n(BZ#1925511)\n\n* SCTP \"Address already in use\" when no active endpoints from RHEL 8.2\nonwards (BZ#1927521)\n\n* lpfc: Fix initial FLOGI failure due to BBSCN not supported  (BZ#1927921)\n\n* [mm] mm, oom: remove oom_lock from oom_reaper (BZ#1929738)\n\n* Unexpected thread movement with AMD Milan compared to Rome (BZ#1929740)\n\n* rpmbuild cannot build the userspace RPMs in the kernel package when the\nkernel itself is not built (BZ#1929910)\n\n* [Regression] RHEL8.2 - ISST-LTE:pVM:diapvmlp83:sum:memory DLPAR fails to\nadd memory on multiple trials[mm/memory_hotplug.c:1163] (mm-) (BZ#1930168)\n\n* Configuring the system with non-RT kernel will hang the system\n(BZ#1930735)\n\n* Upstream Patch for Gracefully handle DMAR units with no supported address\nwidthsx86/vt-d (BZ#1932199)\n\n* gfs2: Deadlock between gfs2_{create_inode,inode_lookup} and\ndelete_work_func (BZ#1937109)\n\n* Failing on tsx-ctrl when the flag doesn\u0027t change anything (BZ#1939013)\n\nEnhancement(s):\n\n* RFE: Backport all Audit enhancements and fixes up to version 5.10-rc1\n(BZ#1907520)\n\n* RHEL8.4: Update the target driver (BZ#1918363)\n\n* [Mellanox 8.4 FEAT] mlx5: Hairpin Support in Switch Mode (BZ#1924689)\n\n4. ==========================================================================\nUbuntu Security Notice USN-4883-1\nMarch 20, 2021\n\nlinux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-gcp,\nlinux-gcp-4.15, linux-hwe, linux-kvm, linux-raspi2, linux-snapdragon\nvulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 18.04 LTS\n- Ubuntu 16.04 LTS\n- Ubuntu 14.04 ESM\n\nSummary:\n\nSeveral security issues were fixed in the Linux kernel. A local attacker could use this to cause a denial of\nservice (system crash) or possibly execute arbitrary code. (CVE-2021-27365)\n\nAdam Nichols discovered that the iSCSI subsystem in the Linux kernel did\nnot properly restrict access to iSCSI transport handles. A local attacker\ncould use this to cause a denial of service or expose sensitive information\n(kernel pointer addresses). A local attacker could use this to cause a\ndenial of service (system crash) or expose sensitive information (kernel\nmemory). (CVE-2021-27364)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 18.04 LTS:\n  linux-image-4.15.0-1081-raspi2  4.15.0-1081.86\n  linux-image-4.15.0-1087-kvm     4.15.0-1087.89\n  linux-image-4.15.0-1095-gcp     4.15.0-1095.108\n  linux-image-4.15.0-1096-aws     4.15.0-1096.103\n  linux-image-4.15.0-1098-snapdragon  4.15.0-1098.107\n  linux-image-4.15.0-1110-azure   4.15.0-1110.122\n  linux-image-4.15.0-139-generic  4.15.0-139.143\n  linux-image-4.15.0-139-generic-lpae  4.15.0-139.143\n  linux-image-4.15.0-139-lowlatency  4.15.0-139.143\n  linux-image-aws-lts-18.04       4.15.0.1096.99\n  linux-image-azure-lts-18.04     4.15.0.1110.83\n  linux-image-gcp-lts-18.04       4.15.0.1095.113\n  linux-image-generic             4.15.0.139.126\n  linux-image-generic-lpae        4.15.0.139.126\n  linux-image-kvm                 4.15.0.1087.83\n  linux-image-lowlatency          4.15.0.139.126\n  linux-image-powerpc-e500mc      4.15.0.139.126\n  linux-image-powerpc-smp         4.15.0.139.126\n  linux-image-powerpc64-emb       4.15.0.139.126\n  linux-image-powerpc64-smp       4.15.0.139.126\n  linux-image-raspi2              4.15.0.1081.78\n  linux-image-snapdragon          4.15.0.1098.101\n  linux-image-virtual             4.15.0.139.126\n\nUbuntu 16.04 LTS:\n  linux-image-4.15.0-1095-gcp     4.15.0-1095.108~16.04.1\n  linux-image-4.15.0-1096-aws     4.15.0-1096.103~16.04.1\n  linux-image-4.15.0-1110-azure   4.15.0-1110.122~16.04.1\n  linux-image-4.15.0-139-generic  4.15.0-139.143~16.04.1\n  linux-image-4.15.0-139-generic-lpae  4.15.0-139.143~16.04.1\n  linux-image-4.15.0-139-lowlatency  4.15.0-139.143~16.04.1\n  linux-image-4.4.0-1090-kvm      4.4.0-1090.99\n  linux-image-4.4.0-1124-aws      4.4.0-1124.138\n  linux-image-4.4.0-1152-snapdragon  4.4.0-1152.162\n  linux-image-4.4.0-206-generic   4.4.0-206.238\n  linux-image-4.4.0-206-generic-lpae  4.4.0-206.238\n  linux-image-4.4.0-206-lowlatency  4.4.0-206.238\n  linux-image-4.4.0-206-powerpc-e500mc  4.4.0-206.238\n  linux-image-4.4.0-206-powerpc-smp  4.4.0-206.238\n  linux-image-4.4.0-206-powerpc64-emb  4.4.0-206.238\n  linux-image-4.4.0-206-powerpc64-smp  4.4.0-206.238\n  linux-image-aws                 4.4.0.1124.129\n  linux-image-aws-hwe             4.15.0.1096.89\n  linux-image-azure               4.15.0.1110.101\n  linux-image-azure-edge          4.15.0.1110.101\n  linux-image-gcp                 4.15.0.1095.96\n  linux-image-generic             4.4.0.206.212\n  linux-image-generic-hwe-16.04   4.15.0.139.134\n  linux-image-generic-lpae        4.4.0.206.212\n  linux-image-generic-lpae-hwe-16.04  4.15.0.139.134\n  linux-image-gke                 4.15.0.1095.96\n  linux-image-kvm                 4.4.0.1090.88\n  linux-image-lowlatency          4.4.0.206.212\n  linux-image-lowlatency-hwe-16.04  4.15.0.139.134\n  linux-image-oem                 4.15.0.139.134\n  linux-image-powerpc-e500mc      4.4.0.206.212\n  linux-image-powerpc-smp         4.4.0.206.212\n  linux-image-powerpc64-emb       4.4.0.206.212\n  linux-image-powerpc64-smp       4.4.0.206.212\n  linux-image-snapdragon          4.4.0.1152.144\n  linux-image-virtual             4.4.0.206.212\n  linux-image-virtual-hwe-16.04   4.15.0.139.134\n\nUbuntu 14.04 ESM:\n  linux-image-4.15.0-1110-azure   4.15.0-1110.122~14.04.1\n  linux-image-4.4.0-1088-aws      4.4.0-1088.92\n  linux-image-aws                 4.4.0.1088.85\n  linux-image-azure               4.15.0.1110.83\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \n\nATTENTION: Due to an unavoidable ABI change the kernel updates have\nbeen given a new version number, which requires you to recompile and\nreinstall all third party kernel modules you might have installed. \nUnless you manually uninstalled the standard kernel metapackages\n(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,\nlinux-powerpc), a standard system upgrade will automatically perform\nthis as well",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2021-27363"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-004361"
      },
      {
        "db": "VULHUB",
        "id": "VHN-386598"
      },
      {
        "db": "PACKETSTORM",
        "id": "162242"
      },
      {
        "db": "PACKETSTORM",
        "id": "162246"
      },
      {
        "db": "PACKETSTORM",
        "id": "162478"
      },
      {
        "db": "PACKETSTORM",
        "id": "162095"
      },
      {
        "db": "PACKETSTORM",
        "id": "162108"
      },
      {
        "db": "PACKETSTORM",
        "id": "162112"
      },
      {
        "db": "PACKETSTORM",
        "id": "161909"
      }
    ],
    "trust": 2.34
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2021-27363",
        "trust": 3.2
      },
      {
        "db": "OPENWALL",
        "id": "OSS-SECURITY/2021/03/06/1",
        "trust": 2.5
      },
      {
        "db": "PACKETSTORM",
        "id": "162117",
        "trust": 1.7
      },
      {
        "db": "PACKETSTORM",
        "id": "162478",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "162095",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "161909",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "162108",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "162242",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-004361",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "161952",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "162341",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "162528",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "162151",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "162383",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "162337",
        "trust": 0.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202103-523",
        "trust": 0.7
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1589",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1694",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1655",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.0837",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1406",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1339",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1224",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1307",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1184",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1002",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.2589",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.3346",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1558",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1299",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1635",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.2136",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1445",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.0981",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1212",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1151",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1669",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.2781",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1101",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021051001",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021042828",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021050609",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021041608",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021041223",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021051317",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021042136",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "162246",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "162112",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "162115",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "162156",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "161973",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "162247",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "162098",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "162255",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "162346",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-386598",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-386598"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-004361"
      },
      {
        "db": "PACKETSTORM",
        "id": "162242"
      },
      {
        "db": "PACKETSTORM",
        "id": "162246"
      },
      {
        "db": "PACKETSTORM",
        "id": "162478"
      },
      {
        "db": "PACKETSTORM",
        "id": "162095"
      },
      {
        "db": "PACKETSTORM",
        "id": "162108"
      },
      {
        "db": "PACKETSTORM",
        "id": "162112"
      },
      {
        "db": "PACKETSTORM",
        "id": "161909"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202103-523"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-27363"
      }
    ]
  },
  "id": "VAR-202103-0920",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-386598"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-09-19T21:35:08.064000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "iscsi",
        "trust": 0.8,
        "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-004361"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-noinfo",
        "trust": 1.0
      },
      {
        "problemtype": "Lack of information (CWE-noinfo) [NVD Evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-004361"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-27363"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://www.openwall.com/lists/oss-security/2021/03/06/1"
      },
      {
        "trust": 2.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-27363"
      },
      {
        "trust": 1.7,
        "url": "https://security.netapp.com/advisory/ntap-20210409-0001/"
      },
      {
        "trust": 1.7,
        "url": "http://packetstormsecurity.com/files/162117/kernel-live-patch-security-notice-lsn-0075-1.html"
      },
      {
        "trust": 1.7,
        "url": "https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html"
      },
      {
        "trust": 1.7,
        "url": "https://bugzilla.suse.com/show_bug.cgi?id=1182716"
      },
      {
        "trust": 1.7,
        "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=688e8128b7a92df982709a4137ea4588d16f24aa"
      },
      {
        "trust": 1.7,
        "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html"
      },
      {
        "trust": 1.7,
        "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html"
      },
      {
        "trust": 1.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-27363"
      },
      {
        "trust": 0.7,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-27364"
      },
      {
        "trust": 0.7,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-27365"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/security/cve/cve-2021-27364"
      },
      {
        "trust": 0.6,
        "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce"
      },
      {
        "trust": 0.6,
        "url": "https://bugzilla.redhat.com/):"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/security/cve/cve-2021-27365"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/security/team/contact/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.0837"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021051001"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/162095/red-hat-security-advisory-2021-1070-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1589"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1445"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1307"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/162242/red-hat-security-advisory-2021-1267-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1406"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021042828"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1669"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.2781"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1151"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.0981"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1212"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021041223"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021042136"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1299"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1694"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/161952/ubuntu-security-notice-usn-4887-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021051317"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.3346"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/161909/ubuntu-security-notice-usn-4883-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021050609"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/162341/red-hat-security-advisory-2021-1373-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/linux-kernel-read-write-access-via-iscsi-show-transport-handle-34762"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/162108/red-hat-security-advisory-2021-1081-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-data-risk-manager-is-affected-by-multiple-vulnerabilities-4/"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/162151/red-hat-security-advisory-2021-1168-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/162478/red-hat-security-advisory-2021-1429-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021041608"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1558"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1635"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1655"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.2589"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1339"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/162337/red-hat-security-advisory-2021-1369-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1184"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1224"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.2136"
      },
      {
        "trust": 0.6,
        "url": "https://www.ibm.com/support/pages/node/6525030"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/162528/red-hat-security-advisory-2021-1531-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1002"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1101"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/162383/red-hat-security-advisory-2021-1448-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-qradar-network-packet-capture-is-vulnerable-to-using-components-with-known-vulnerabilities-2/"
      },
      {
        "trust": 0.5,
        "url": "https://access.redhat.com/security/team/key/"
      },
      {
        "trust": 0.5,
        "url": "https://access.redhat.com/articles/11258"
      },
      {
        "trust": 0.5,
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3347"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2021-3347"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-28374"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-26708"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0466"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-27152"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27152"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-0466"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-28374"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-26708"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14351"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-14351"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:1267"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:1279"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhba-2021:1427"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-2163"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-20305"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/updates/classification/#low"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:1429"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25649"
      },
      {
        "trust": 0.1,
        "url": "https://docs.openshift.com/container-platform/4.6/updating/updating-cluster"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3447"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-3447"
      },
      {
        "trust": 0.1,
        "url": "https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-rel"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-20305"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-25649"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-2163"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:1070"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:1081"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:1093"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-snapdragon/4.15.0-1098.107"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1087.89"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-aws-hwe/4.15.0-1096.103~16.04.1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux/4.15.0-139.143"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1152.162"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-raspi2/4.15.0-1081.86"
      },
      {
        "trust": 0.1,
        "url": "https://ubuntu.com/security/notices/usn-4883-1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-gcp-4.15/4.15.0-1095.108"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1090.99"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1110.122~16.04.1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1095.108~16.04.1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux/4.4.0-206.238"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1124.138"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1096.103"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-azure-4.15/4.15.0-1110.122"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-139.143~16.04.1"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-386598"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-004361"
      },
      {
        "db": "PACKETSTORM",
        "id": "162242"
      },
      {
        "db": "PACKETSTORM",
        "id": "162246"
      },
      {
        "db": "PACKETSTORM",
        "id": "162478"
      },
      {
        "db": "PACKETSTORM",
        "id": "162095"
      },
      {
        "db": "PACKETSTORM",
        "id": "162108"
      },
      {
        "db": "PACKETSTORM",
        "id": "162112"
      },
      {
        "db": "PACKETSTORM",
        "id": "161909"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202103-523"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-27363"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-386598"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-004361"
      },
      {
        "db": "PACKETSTORM",
        "id": "162242"
      },
      {
        "db": "PACKETSTORM",
        "id": "162246"
      },
      {
        "db": "PACKETSTORM",
        "id": "162478"
      },
      {
        "db": "PACKETSTORM",
        "id": "162095"
      },
      {
        "db": "PACKETSTORM",
        "id": "162108"
      },
      {
        "db": "PACKETSTORM",
        "id": "162112"
      },
      {
        "db": "PACKETSTORM",
        "id": "161909"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202103-523"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-27363"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-03-07T00:00:00",
        "db": "VULHUB",
        "id": "VHN-386598"
      },
      {
        "date": "2021-11-18T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2021-004361"
      },
      {
        "date": "2021-04-20T16:13:12",
        "db": "PACKETSTORM",
        "id": "162242"
      },
      {
        "date": "2021-04-20T16:17:42",
        "db": "PACKETSTORM",
        "id": "162246"
      },
      {
        "date": "2021-05-06T01:15:29",
        "db": "PACKETSTORM",
        "id": "162478"
      },
      {
        "date": "2021-04-06T14:35:33",
        "db": "PACKETSTORM",
        "id": "162095"
      },
      {
        "date": "2021-04-07T20:04:40",
        "db": "PACKETSTORM",
        "id": "162108"
      },
      {
        "date": "2021-04-07T20:08:52",
        "db": "PACKETSTORM",
        "id": "162112"
      },
      {
        "date": "2021-03-22T15:29:43",
        "db": "PACKETSTORM",
        "id": "161909"
      },
      {
        "date": "2021-03-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202103-523"
      },
      {
        "date": "2021-03-07T04:15:13.330000",
        "db": "NVD",
        "id": "CVE-2021-27363"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2022-05-23T00:00:00",
        "db": "VULHUB",
        "id": "VHN-386598"
      },
      {
        "date": "2021-11-18T09:07:00",
        "db": "JVNDB",
        "id": "JVNDB-2021-004361"
      },
      {
        "date": "2022-07-11T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202103-523"
      },
      {
        "date": "2022-05-23T16:00:39.467000",
        "db": "NVD",
        "id": "CVE-2021-27363"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "161909"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202103-523"
      }
    ],
    "trust": 0.7
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Linux\u00a0Kernel\u00a0 Vulnerability in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-004361"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202103-523"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.