CVE-2021-47290

5.5 MEDIUM

📋 TL;DR

A NULL pointer dereference vulnerability in the Linux kernel's SCSI target subsystem allows local attackers to cause a kernel panic (denial of service) when EXTENDED COPY operations complete. This affects systems using LIO (Linux-IO) target with CPU affinity control enabled. Attackers with local access can crash the kernel.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions with commit 39ae3edda325 (v5.13-rc1) through fixed versions
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when using LIO target with CPU affinity control enabled and performing EXTENDED COPY operations.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, potentially causing data loss or service disruption.

🟠

Likely Case

Local denial of service through kernel crash when EXTENDED COPY operations are performed.

🟢

If Mitigated

Minimal impact if CPU affinity control is disabled or systems don't use EXTENDED COPY functionality.

🌐 Internet-Facing: LOW - Requires local access to trigger, not remotely exploitable.
🏢 Internal Only: MEDIUM - Local attackers or misconfigured services could trigger the crash, affecting system stability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Simple local trigger of NULL pointer dereference

Exploitation requires local access and ability to perform EXTENDED COPY operations through LIO target.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions with commits a47fa41381a09e5997afd762664db4f5f6657e03 or e7732c5a19a15a62b0b23fd683a639b0483e1f40

Vendor Advisory: https://git.kernel.org/stable/c/a47fa41381a09e5997afd762664db4f5f6657e03

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution. 2. Reboot system to load new kernel. 3. Verify kernel version matches patched release.

🔧 Temporary Workarounds

Disable CPU affinity control

linux

Disable the CPU affinity feature that triggers the NULL pointer dereference

echo 0 > /sys/kernel/config/target/core/$WWPN/$TPG/cmd_compl_affinity

Disable EXTENDED COPY support

linux

Prevent use of vulnerable EXTENDED COPY functionality

Modify LIO configuration to disable XCOPY support

🧯 If You Can't Patch

  • Restrict local user access to systems using LIO target
  • Monitor for kernel panic events and investigate EXTENDED COPY usage

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if LIO target with CPU affinity is configured: uname -r and check /sys/kernel/config/target/ for cmd_compl_affinity settings

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits: grep -q 'a47fa41381a09e5997afd762664db4f5f6657e03\|e7732c5a19a15a62b0b23fd683a639b0483e1f40' /proc/version_signature

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages with NULL pointer dereference at target_complete_cmd
  • BUG: kernel NULL pointer dereference in target_core_mod

Network Indicators:

  • SCSI EXTENDED COPY command traffic to affected systems

SIEM Query:

source="kernel" AND "NULL pointer dereference" AND "target_complete_cmd"

🔗 References

📤 Share & Export