Lucene search

K
redhatRedHatRHSA-2021:1071
HistoryApr 06, 2021 - 7:28 a.m.

(RHSA-2021:1071) Important: kernel security and bug fix update

2021-04-0607:28:22
(CWE-250|CWE-122)
access.redhat.com
251
kernel packages
linux operating system
out-of-bounds read
heap buffer overflow
unrestricted access
iscsi subsystem
intermittent boot problem
scsi command
mellanox patches
hard lockup
receiver fast path

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

39.2%

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: out-of-bounds read in libiscsi module (CVE-2021-27364)

  • kernel: heap buffer overflow in the iSCSI subsystem (CVE-2021-27365)

  • kernel: iscsi: unrestricted access to sessions and handles (CVE-2021-27363)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • Customer testing eMMC sees and intermittent boot problem on 7.8+, was not seen on 7.3 (BZ#1918916)

  • tcm loopback driver causes double-start of scsi command when work is delayed (BZ#1925652)

  • [Azure][RHEL-7]Mellanox Patches To Prevent Kernel Hang In MLX4 (BZ#1925691)

  • A patch from upstream c365c292d059 causes us to end up leaving rt_nr_boosted in an inconsistent state, which causes a hard lockup. (BZ#1928082)

  • [RHEL7.9.z] Add fix to update snd_wl1 in bulk receiver fast path (BZ#1929804)

Affected configurations

Vulners
Node
redhatkernel-rtRange3.10.0-1160.24.1.rt56.1161.el7
OR
redhatkernelRange3.10.0-1160.24.1.el7
OR
redhatkernelRange3.10.0-327.96.1.el7
OR
redhatkernelRange3.10.0-514.88.1.el7
OR
redhatkernelRange3.10.0-693.84.1.el7
OR
redhatkernelRange3.10.0-957.72.1.el7
OR
redhatkernelRange3.10.0-1062.49.1.el7
OR
redhatkernel-rtRange4.18.0-240.22.1.rt7.77.el8_3
OR
redhatkernelRange4.18.0-240.22.1.el8_3
OR
redhatkernelRange4.18.0-147.44.1.el8_1
OR
redhatkernel-rtRange4.18.0-193.51.1.rt13.101.el8_2
OR
redhatkernelRange4.18.0-193.51.1.el8_2
OR
redhatkernelRange3.10.0-957.72.1.el7
OR
redhatkernelRange2.6.32-754.39.1.el6
OR
redhatkernelRange4.14.0-115.36.1.el7a
AND
redhatenterprise_linuxMatch7
OR
redhatenterprise_linuxMatchnfv
OR
redhatenterprise_linuxMatch8
OR
redhatenterprise_linuxMatchhypervisor
VendorProductVersionCPE
redhatkernel-rt*cpe:2.3:o:redhat:kernel-rt:*:*:*:*:*:*:*:*
redhatkernel*cpe:2.3:a:redhat:kernel:*:*:*:*:*:*:*:*
redhatenterprise_linux7cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*
redhatenterprise_linuxnfvcpe:2.3:o:redhat:enterprise_linux:nfv:*:*:*:*:*:*:*
redhatenterprise_linux8cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*
redhatenterprise_linuxhypervisorcpe:2.3:o:redhat:enterprise_linux:hypervisor:*:*:*:*:*:*:*

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

39.2%