CVE-2021-27364 - Out-of-bounds Read

Severity

71%

Complexity

18%

Confidentiality

86%

An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages.

CVSS 3.1 Base Score 7.1. CVSS Attack Vector: local. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H).

CVSS 2.0 Base Score 3.6. CVSS Attack Vector: local. CVSS Attack Complexity: low. CVSS Vector: (AV:L/AC:L/Au:N/C:P/I:N/A:P).

Demo Examples

Out-of-bounds Read

CWE-125

In the following code, the method retrieves a value from an array at a specific array index location that is given as an input parameter to the method


               
}
return value;// check that the array index is less than the maximum// length of the array
value = array[index];// get the value at the specified index of the array
// if array index is invalid then output error message// and return value indicating error
value = -1;

However, this method only verifies that the given array index is less than the maximum length of the array but does not check for the minimum value (CWE-839). This will allow a negative value to be accepted as the input array index, which will result in a out of bounds read (CWE-125) and may allow access to sensitive memory. The input array index should be checked to verify that is within the maximum and minimum range required for the array (CWE-129). In this example the if statement should be modified to include a minimum range check, as shown below.


               
...// check that the array index is within the correct// range of values for the array

Overview

Type

Linux

First reported 3 years ago

2021-03-07 05:15:00

Last updated 3 years ago

2021-12-08 19:49:00

Affected Software

Linux Kernel

Debian Linux 9.0

9.0

Canonical Ubuntu Linux 14.04 ESM Edition

14.04

Canonical Ubuntu Linux 16.04 LTS (Long-Term Support)

16.04

Canonical Ubuntu Linux 18.04 LTS Edition

18.04

Canonical Ubuntu Linux 20.04 LTS Edition

20.04

References

https://bugzilla.suse.com/show_bug.cgi?id=1182717

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=688e8128b7a92df982709a4137ea4588d16f24aa

https://www.openwall.com/lists/oss-security/2021/03/06/1

[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update

https://bugzilla.suse.com/show_bug.cgi?id=1182717

Issue Tracking, Third Party Advisory

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=688e8128b7a92df982709a4137ea4588d16f24aa

Mailing List, Patch, Vendor Advisory

[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update

Mailing List, Third Party Advisory

https://www.openwall.com/lists/oss-security/2021/03/06/1

Mailing List, Third Party Advisory

https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html

https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html

Exploit, Third Party Advisory

[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update

http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html

https://security.netapp.com/advisory/ntap-20210409-0001/

https://www.oracle.com/security-alerts/cpuoct2021.html

[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update

Mailing List, Third Party Advisory

http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html

Third Party Advisory, VDB Entry

https://security.netapp.com/advisory/ntap-20210409-0001/

Third Party Advisory

https://www.oracle.com/security-alerts/cpuoct2021.html

Patch, Third Party Advisory

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.