### [CVE-2021-27365](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27365) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen) ### Description An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message. ### POC #### Reference - http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html - https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ec98ea7070e94cc25a422ec97d1421e28d97b7ee - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f9dbdf97a5bd92b1a49cee3d591b55b11fd7a6d5 - https://www.oracle.com/security-alerts/cpuoct2021.html #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/EGI-Federation/SVG-advisories - https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/Iweisc/Kernel-CVE-2021-27365-hotfix - https://github.com/Iweisc/Kernel-Module-192CV - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/a-roshbaik/Linux-Privilege-Escalation-Exploits - https://github.com/aaronxie55/Presentation2_Markdown - https://github.com/bollwarm/SecToolSet - https://github.com/c4pt000/kernel-5.11.6-expSEHDsec-HAXM-cgroup-virtio-nvidia-amd-kaliwifi - https://github.com/c4pt000/kernel-6.6.0-expSEHDsec-HAXM-cgroup-virtio-nvidia-amd-kaliwifi - https://github.com/c4pt000/kernel-6.8.2-expSEHDsec-HAXM-cgroupvirtio - https://github.com/c4pt000/kernel-6.8.3-expSEHDsec-fclock-fsync-cpu - https://github.com/eeenvik1/scripts_for_YouTrack - https://github.com/gipi/cve-cemetery - https://github.com/kdn111/linux-kernel-exploitation - https://github.com/khanhdn111/linux-kernel-exploitation - https://github.com/khanhdz-06/linux-kernel-exploitation - https://github.com/khanhdz191/linux-kernel-exploitation - https://github.com/khanhhdz/linux-kernel-exploitation - https://github.com/khanhhdz06/linux-kernel-exploitation - https://github.com/khanhnd123/linux-kernel-exploitation - https://github.com/khnhdz/linux-kernel-exploitation - https://github.com/knd06/linux-kernel-exploitation - https://github.com/malwaremily/infosec-news-briefs - https://github.com/ndk06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/plzheheplztrying/cve_monitor - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/teresaweber685/book_list - https://github.com/vlain1337/auto-lpe - https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation