<!--X-Body-Begin-->
<!--X-User-Header-->
oss-sec
mailing list archives
<!--X-User-Header-End-->
<!--X-TopPNI-->
By Date
By Thread
</form>
<!--X-TopPNI-End-->
<!--X-MsgBody-->
<!--X-Subject-Header-Begin-->
Linux iscsi security fixes
<!--X-Subject-Header-End-->
<!--X-Head-of-Message-->
From: Marcus Meissner <meissner () suse de>
Date: Sat, 6 Mar 2021 09:39:24 +0100
<!--X-Head-of-Message-End-->
<!--X-Head-Body-Sep-Begin-->
<!--X-Head-Body-Sep-End-->
<!--X-Body-of-Message-->
Hi,
The iscsi developers have just published 3 security fixes to Linux Kernel mainline git.
Reported-by: Adam Nichols <adam () grimm-co com>
(I think) the researcher had requested CVEs, the kernel devs however ommitted them from the commits.
CVE-2021-27365: iscsi_host_get_param() allows sysfs params larger than 4k
The linux kernel iscsi initiator code allows initiator/target parameters to be negotiated than can be longer
than 4k, since no limit is imposed. But when these values are displayed via sysfs, the sysfs subsystem limits that
output to 4k, so the memory above that gets leaked.
https://bugzilla.suse.com/show_bug.cgi?id=1182715
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ec98ea7070e94cc25a422ec97d1421e28d97b7ee
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f9dbdf97a5bd92b1a49cee3d591b55b11fd7a6d5
(not sure if both directly associated, but both fix the same class of issues)
(2 fixes in 1 upstream commit, just in 2 seperate hunks:)
CVE-2021-27363: kernel-source: show_transport_handle() shows iSCSI transport handle to non-root users
The iscsi initiator kernel subsystem makes the transport handle available via sysfs so that the iscsid daemon
can access it, but it makes this visible to all users, making it possible for non-root users to attack the iscsi
subsystem using this knowledge, particularly together with CVE-2021-27364, which allows non-root users to user the
netlink socket to talk to the iscsi kernel subsystem.
https://bugzilla.suse.com/show_bug.cgi?id=1182716
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=688e8128b7a92df982709a4137ea4588d16f24aa
CVE-2021-27364: kernel-source: iscsi_if_recv_msg() allows non-root users to connect and send commands
This vulnerability allows any user to connect to the iscsi NETLINK socket and send commands to the kernel, such
as "end a session", which is not good.
Together with CVE-2021-27363, this allows non-root bad actors to end sessions arbitrarily. (See bsc#1182716).
https://bugzilla.suse.com/show_bug.cgi?id=1182717
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=688e8128b7a92df982709a4137ea4588d16f24aa
Ciao, Marcus
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<!--X-Follow-Ups-End-->
<!--X-References-->
<!--X-References-End-->
<!--X-BotPNI-->
By Date
By Thread
Current thread:
Linux iscsi security fixes Marcus Meissner (Mar 06)
<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->