CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:N/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
EPSS
Percentile
25.8%
An issue was discovered in the Linux kernel through 5.11.3. A kernel
pointer leak can be used to determine the address of the iscsi_transport
structure. When an iSCSI transport is registered with the iSCSI subsystem,
the transport’s handle is available to unprivileged users via the sysfs
file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When
read, the show_transport_handle function (in
drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle.
This handle is actually the pointer to an iscsi_transport struct in the
kernel module’s global variables.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | <Â 4.15.0-139.143 | UNKNOWN |
ubuntu | 20.04 | noarch | linux | <Â 5.4.0-70.78 | UNKNOWN |
ubuntu | 20.10 | noarch | linux | <Â 5.8.0-48.54 | UNKNOWN |
ubuntu | 14.04 | noarch | linux | <Â 3.13.0-185.236 | UNKNOWN |
ubuntu | 16.04 | noarch | linux | <Â 4.4.0-206.238 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | <Â 4.15.0-1096.103 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | <Â 5.4.0-1041.43 | UNKNOWN |
ubuntu | 20.10 | noarch | linux-aws | <Â 5.8.0-1027.29 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-aws | <Â 4.4.0-1088.92 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-aws | <Â 4.4.0-1124.138 | UNKNOWN |
www.openwall.com/lists/oss-security/2021/03/06/1
bugzilla.suse.com/show_bug.cgi?id=1182716
git.kernel.org/linus/688e8128b7a92df982709a4137ea4588d16f24aa
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=688e8128b7a92df982709a4137ea4588d16f24aa
launchpad.net/bugs/cve/CVE-2021-27363
nvd.nist.gov/vuln/detail/CVE-2021-27363
security-tracker.debian.org/tracker/CVE-2021-27363
ubuntu.com/security/notices/USN-4883-1
ubuntu.com/security/notices/USN-4887-1
ubuntu.com/security/notices/USN-4889-1
ubuntu.com/security/notices/USN-4901-1
www.cve.org/CVERecord?id=CVE-2021-27363
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:N/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
EPSS
Percentile
25.8%