• 公告ID (KylinSec-SA-2024-2552)

摘要:

In the Linux kernel, the following vulnerability has been resolved:

scsi: iscsi: Fix conn use after free during resets

If we haven't done a unbind target call we can race where
iscsi_conn_teardown wakes up the EH thread and then frees the conn while
those threads are still accessing the conn ehwait.

We can only do one TMF per session so this just moves the TMF fields from
the conn to the session. We can then rely on the
iscsi_session_teardown->iscsi_remove_session->__iscsi_unbind_session call
to remove the target and it's devices, and know after that point there is
no device or scsi-ml callout trying to access the session.

安全等级: Low

公告ID: KylinSec-SA-2024-2552

发布日期: 2024年6月2日

关联CVE: CVE-2021-47328  

  • 详细介绍

1. 漏洞描述

   

In the Linux kernel, the following vulnerability has been resolved:

scsi: iscsi: Fix conn use after free during resets

If we haven't done a unbind target call we can race where
iscsi_conn_teardown wakes up the EH thread and then frees the conn while
those threads are still accessing the conn ehwait.

We can only do one TMF per session so this just moves the TMF fields from
the conn to the session. We can then rely on the
iscsi_session_teardown->iscsi_remove_session->__iscsi_unbind_session call
to remove the target and it's devices, and know after that point there is
no device or scsi-ml callout trying to access the session.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2021-47328 KY3.4-4A kernel Unaffected
CVE-2021-47328 KY3.4-5A kernel Unaffected
CVE-2021-47328 KY3.5.1 kernel Unaffected
CVE-2021-47328 KY3.5.2 kernel Unaffected
CVE-2021-47328 V6 kernel Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2024-2551 下一篇:KylinSec-SA-2024-2553