2024-07-14 02:06:08 +00:00

29 lines
2.0 KiB
JSON

{
"id": "CVE-2021-47427",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-21T15:15:28.117",
"lastModified": "2024-05-21T16:53:56.550",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: iscsi: Fix iscsi_task use after free\n\nCommit d39df158518c (\"scsi: iscsi: Have abort handler get ref to conn\")\nadded iscsi_get_conn()/iscsi_put_conn() calls during abort handling but\nthen also changed the handling of the case where we detect an already\ncompleted task where we now end up doing a goto to the common put/cleanup\ncode. This results in a iscsi_task use after free, because the common\ncleanup code will do a put on the iscsi_task.\n\nThis reverts the goto and moves the iscsi_get_conn() to after we've checked\nif the iscsi_task is valid."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: iscsi: corrige el uso after free de iscsi_task. Confirmaci\u00f3n d39df158518c (\"scsi: iscsi: Have abort handler get ref to conn\") se agregaron llamadas iscsi_get_conn()/iscsi_put_conn() durante el manejo de abortos pero luego tambi\u00e9n cambi\u00f3 el manejo del caso en el que detectamos una tarea ya completada y ahora terminamos haciendo un acceso al c\u00f3digo com\u00fan de put/cleanup. Esto da como resultado un uso de iscsi_task despu\u00e9s de la liberaci\u00f3n, porque el c\u00f3digo de limpieza com\u00fan colocar\u00e1 iscsi_task. Esto revierte el ir a y mueve iscsi_get_conn() a despu\u00e9s de haber verificado si iscsi_task es v\u00e1lido."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/1642f51ac0d4f2b55d5748094c49ff8f7191b93c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/258aad75c62146453d03028a44f2f1590d58e1f6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}