An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message.
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.openwall.com/lists/oss-security/2021/03/06/1
https://security.netapp.com/advisory/ntap-20210409-0001/
https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://bugzilla.suse.com/show_bug.cgi?id=1182715
https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html
http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html