{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-16T07:51:35.867","vulnerabilities":[{"cve":{"id":"CVE-2021-47290","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2024-05-21T15:15:17.027","lastModified":"2024-12-23T16:47:17.957","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: Fix NULL dereference on XCOPY completion\n\nCPU affinity control added with commit 39ae3edda325 (\"scsi: target: core:\nMake completion affinity configurable\") makes target_complete_cmd() queue\nwork on a CPU based on se_tpg->se_tpg_wwn->cmd_compl_affinity state.\n\nLIO's EXTENDED COPY worker is a special case in that read/write cmds are\ndispatched using the global xcopy_pt_tpg, which carries a NULL se_tpg_wwn\npointer following initialization in target_xcopy_setup_pt().\n\nThe NULL xcopy_pt_tpg->se_tpg_wwn pointer is dereferenced on completion of\nany EXTENDED COPY initiated read/write cmds. E.g using the libiscsi\nSCSI.ExtendedCopy.Simple test:\n\n  BUG: kernel NULL pointer dereference, address: 00000000000001a8\n  RIP: 0010:target_complete_cmd+0x9d/0x130 [target_core_mod]\n  Call Trace:\n   fd_execute_rw+0x148/0x42a [target_core_file]\n   ? __dynamic_pr_debug+0xa7/0xe0\n   ? target_check_reservation+0x5b/0x940 [target_core_mod]\n   __target_execute_cmd+0x1e/0x90 [target_core_mod]\n   transport_generic_new_cmd+0x17c/0x330 [target_core_mod]\n   target_xcopy_issue_pt_cmd+0x9/0x60 [target_core_mod]\n   target_xcopy_read_source.isra.7+0x10b/0x1b0 [target_core_mod]\n   ? target_check_fua+0x40/0x40 [target_core_mod]\n   ? transport_complete_task_attr+0x130/0x130 [target_core_mod]\n   target_xcopy_do_work+0x61f/0xc00 [target_core_mod]\n\nThis fix makes target_complete_cmd() queue work on se_cmd->cpuid if\nse_tpg_wwn is NULL."},{"lang":"es","value":"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: target: corrige la desreferencia NULL al completar XCOPY. El control de afinidad de CPU agregado con la confirmación 39ae3edda325 (\"scsi: target: core: hace que la afinidad de finalización sea configurable\") hace que la cola target_complete_cmd() funcione una CPU basada en el estado se_tpg-&gt;se_tpg_wwn-&gt;cmd_compl_affinity. El trabajador de COPIA EXTENDIDA de LIO es un caso especial en el que los cmds de lectura/escritura se envían utilizando el xcopy_pt_tpg global, que lleva un puntero NULL se_tpg_wwn después de la inicialización en target_xcopy_setup_pt(). Se elimina la referencia al puntero NULL xcopy_pt_tpg-&gt;se_tpg_wwn al finalizar cualquier cmd de lectura/escritura iniciado por COPIA EXTENDIDA. Por ejemplo, utilizando la prueba libiscsi SCSI.ExtendedCopy.Simple: BUG: desreferencia del puntero NULL del kernel, dirección: 00000000000001a8 RIP: 0010:target_complete_cmd+0x9d/0x130 [target_core_mod] Seguimiento de llamadas: fd_execute_rw+0x148/0x42a [target_core_file] __dynamic_pr_debug+0xa7/0xe0? target_check_reservation+0x5b/0x940 [target_core_mod] __target_execute_cmd+0x1e/0x90 [target_core_mod] transport_generic_new_cmd+0x17c/0x330 [target_core_mod] target_xcopy_issue_pt_cmd+0x9/0x60 [target_core_mod] target_xcopy_read_source.isra.7 +0x10b/0x1b0 [target_core_mod] ? target_check_fua+0x40/0x40 [target_core_mod]? transport_complete_task_attr+0x130/0x130 [target_core_mod] target_xcopy_do_work+0x61f/0xc00 [target_core_mod] Esta solución hace que la cola target_complete_cmd() funcione en se_cmd-&gt;cpuid si se_tpg_wwn es NULL."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-476"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.13","versionEndExcluding":"5.13.6","matchCriteriaId":"00CAF7AA-B763-4138-B0F1-E2450358E207"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:*","matchCriteriaId":"71268287-21A8-4488-AA4F-23C473153131"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:5.14:rc2:*:*:*:*:*:*","matchCriteriaId":"23B9E5C6-FAB5-4A02-9E39-27C8787B0991"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/a47fa41381a09e5997afd762664db4f5f6657e03","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/e7732c5a19a15a62b0b23fd683a639b0483e1f40","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/a47fa41381a09e5997afd762664db4f5f6657e03","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/e7732c5a19a15a62b0b23fd683a639b0483e1f40","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]}]}}]}