CVE-2021-47480

In the Linux kernel, the following vulnerability has been resolved: scsi: core: Put LLD module refcnt after SCSI device is released SCSI host release is triggered when SCSI device is freed. We have to make sure that the low-level device driver module won't be unloaded before SCSI host instance is released because shost->hostt is required in the release handler. Make sure to put LLD module refcnt after SCSI device is released. Fixes a kernel panic of 'BUG: unable to handle page fault for address' reported by Changhui and Yi.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc6:*:*:*:*:*:*

History

29 Sep 2025, 16:43

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CWE NVD-CWE-noinfo
References () https://git.kernel.org/stable/c/1105573d964f7b78734348466b01f5f6ba8a1813 - () https://git.kernel.org/stable/c/1105573d964f7b78734348466b01f5f6ba8a1813 - Patch
References () https://git.kernel.org/stable/c/1ce287eff9f23181d5644db787f472463a61f68b - () https://git.kernel.org/stable/c/1ce287eff9f23181d5644db787f472463a61f68b - Patch
References () https://git.kernel.org/stable/c/61a0faa89f21861d1f8d059123b5c285a5d9ffee - () https://git.kernel.org/stable/c/61a0faa89f21861d1f8d059123b5c285a5d9ffee - Patch
References () https://git.kernel.org/stable/c/7b57c38d12aed1b5d92f74748bed25e0d041729f - () https://git.kernel.org/stable/c/7b57c38d12aed1b5d92f74748bed25e0d041729f - Patch
References () https://git.kernel.org/stable/c/8e4814a461787e15a31d322d9efbe0d4f6822428 - () https://git.kernel.org/stable/c/8e4814a461787e15a31d322d9efbe0d4f6822428 - Patch
References () https://git.kernel.org/stable/c/c2df161f69fb1c67f63adbd193368b47f511edc0 - () https://git.kernel.org/stable/c/c2df161f69fb1c67f63adbd193368b47f511edc0 - Patch
References () https://git.kernel.org/stable/c/f2b85040acec9a928b4eb1b57a989324e8e38d3f - () https://git.kernel.org/stable/c/f2b85040acec9a928b4eb1b57a989324e8e38d3f - Patch
References () https://git.kernel.org/stable/c/f30822c0b4c35ec86187ab055263943dc71a6836 - () https://git.kernel.org/stable/c/f30822c0b4c35ec86187ab055263943dc71a6836 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:5.15:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Information

Published : 2024-05-22 09:15

Updated : 2025-09-29 16:43


NVD link : CVE-2021-47480

Mitre link : CVE-2021-47480

CVE.ORG link : CVE-2021-47480


JSON object : View

Products Affected

linux

  • linux_kernel