SB2024060471 - Use-after-free in Linux kernel scsi driver
Published: June 4, 2024 Updated: May 13, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2021-47328)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the iscsi_prep_bidi_ahs(), iscsi_check_tmf_restrictions(), iscsi_data_in_rsp(), EXPORT_SYMBOL_GPL(), iscsi_exec_task_mgmt_fn(), iscsi_eh_abort(), iscsi_eh_device_reset(), iscsi_session_recovery_timedout(), iscsi_conn_failure(), iscsi_eh_target_reset(), iscsi_session_setup(), iscsi_conn_setup(), iscsi_conn_teardown(), iscsi_conn_start() and iscsi_start_session_recovery() functions in drivers/scsi/libiscsi.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/bf20d85a88384574fabb3d53ad62a8af57e7ab11
- https://git.kernel.org/stable/c/d04958a348e560938410e04a12fb99da9c7e6a00
- https://git.kernel.org/stable/c/89812e7957ab0746eab66ed6fc49d52bb4dca250
- https://git.kernel.org/stable/c/f0a031f7c55ffd944fead1ddaf2aa94df9a158c1
- https://git.kernel.org/stable/c/fa9542b35ceb4202e8f8d65f440529a63524dca9
- https://git.kernel.org/stable/c/ec29d0ac29be366450a7faffbcf8cba3a6a3b506
- https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.198
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.52
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.19
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.134