Updated: 2026-01-16
CWE: CWE-476
Description:
In the Linux kernel, the following vulnerability has been resolved: scsi: iscsi: iscsi_tcp: Fix null-ptr-deref while calling getpeername() Fix a NULL pointer crash that occurs when we are freeing the socket at the same time we access it via sysfs. The problem is that: 1. iscsi_sw_tcp_conn_get_param() and iscsi_sw_tcp_host_get_param() take the frwd_lock and do sock_hold() then drop the frwd_lock. sock_hold() does a get on the "struct sock". 2. iscsi_sw_tcp_release_conn() does sockfd_put() which does the last put on the "struct socket" and that does __sock_release() which sets the sock->ops to NULL. 3. iscsi_sw_tcp_conn_get_param() and iscsi_sw_tcp_host_get_param() then call kernel_getpeername() which accesses the NULL sock->ops. Above we do a get on the "struct sock", but we needed a get on the "struct socket". Originally, we just held the frwd_lock the entire time but in commit bcf3a2953d36 ("scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername()") we switched to refcount based because the network layer changed and started taking a mutex in that path, so we could no longer hold the frwd_lock. Instead of trying to maintain multiple refcounts, this just has us use a mutex for accessing the socket in the interface code paths.
CVSS3: 7
| OS | Vendor version | Errata |
|---|---|---|
| Ubuntu 22.04 | 5.15.0-60.66 | USN-5851-1 |
| RHEL 9 | 5.14.0-284.11.1.el9_2 | RHSA-2023:2458 |
| Amazon Linux 2 5.10 | 5.10.155-138.670.amzn2 | ALAS2KERNEL-5.10-2022-023 |
| OS | Original kernel version | State |
|---|---|---|
| Ubuntu 22.04 | |
Planned |
| RHEL 9 | |
Planned |
| Amazon Linux 2 5.10 | |
Will Not Fix |