U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2021-47480 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: core: Put LLD module refcnt after SCSI device is released SCSI host release is triggered when SCSI device is freed. We have to make sure that the low-level device driver module won't be unloaded before SCSI host instance is released because shost->hostt is required in the release handler. Make sure to put LLD module refcnt after SCSI device is released. Fixes a kernel panic of 'BUG: unable to handle page fault for address' reported by Changhui and Yi.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/1105573d964f7b78734348466b01f5f6ba8a1813
https://git.kernel.org/stable/c/1105573d964f7b78734348466b01f5f6ba8a1813
https://git.kernel.org/stable/c/1ce287eff9f23181d5644db787f472463a61f68b
https://git.kernel.org/stable/c/1ce287eff9f23181d5644db787f472463a61f68b
https://git.kernel.org/stable/c/61a0faa89f21861d1f8d059123b5c285a5d9ffee
https://git.kernel.org/stable/c/61a0faa89f21861d1f8d059123b5c285a5d9ffee
https://git.kernel.org/stable/c/7b57c38d12aed1b5d92f74748bed25e0d041729f
https://git.kernel.org/stable/c/7b57c38d12aed1b5d92f74748bed25e0d041729f
https://git.kernel.org/stable/c/8e4814a461787e15a31d322d9efbe0d4f6822428
https://git.kernel.org/stable/c/8e4814a461787e15a31d322d9efbe0d4f6822428
https://git.kernel.org/stable/c/c2df161f69fb1c67f63adbd193368b47f511edc0
https://git.kernel.org/stable/c/c2df161f69fb1c67f63adbd193368b47f511edc0
https://git.kernel.org/stable/c/f2b85040acec9a928b4eb1b57a989324e8e38d3f
https://git.kernel.org/stable/c/f2b85040acec9a928b4eb1b57a989324e8e38d3f
https://git.kernel.org/stable/c/f30822c0b4c35ec86187ab055263943dc71a6836
https://git.kernel.org/stable/c/f30822c0b4c35ec86187ab055263943dc71a6836

Weakness Enumeration

CWE-ID CWE Name Source

Change History

3 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2021-47480
NVD Published Date:
05/22/2024
NVD Last Modified:
11/21/2024
Source:
kernel.org