In the Linux kernel, the following vulnerability has been resolved:
scsi: core: Put LLD module refcnt after SCSI device is released
SCSI host release is triggered when SCSI device is freed. We have to make
sure that the low-level device driver module won't be unloaded before SCSI
host instance is released because shost->hostt is required in the release
handler.
Make sure to put LLD module refcnt after SCSI device is released.
Fixes a kernel panic of 'BUG: unable to handle page fault for address'
reported by Changhui and Yi.
References
Configurations
Configuration 1 (hide)
|
History
29 Sep 2025, 16:43
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux
Linux linux Kernel |
|
| CWE | NVD-CWE-noinfo | |
| References | () https://git.kernel.org/stable/c/1105573d964f7b78734348466b01f5f6ba8a1813 - Patch | |
| References | () https://git.kernel.org/stable/c/1ce287eff9f23181d5644db787f472463a61f68b - Patch | |
| References | () https://git.kernel.org/stable/c/61a0faa89f21861d1f8d059123b5c285a5d9ffee - Patch | |
| References | () https://git.kernel.org/stable/c/7b57c38d12aed1b5d92f74748bed25e0d041729f - Patch | |
| References | () https://git.kernel.org/stable/c/8e4814a461787e15a31d322d9efbe0d4f6822428 - Patch | |
| References | () https://git.kernel.org/stable/c/c2df161f69fb1c67f63adbd193368b47f511edc0 - Patch | |
| References | () https://git.kernel.org/stable/c/f2b85040acec9a928b4eb1b57a989324e8e38d3f - Patch | |
| References | () https://git.kernel.org/stable/c/f30822c0b4c35ec86187ab055263943dc71a6836 - Patch | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CPE | cpe:2.3:o:linux:linux_kernel:5.15:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.15:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
Information
Published : 2024-05-22 09:15
Updated : 2025-09-29 16:43
NVD link : CVE-2021-47480
Mitre link : CVE-2021-47480
CVE.ORG link : CVE-2021-47480
JSON object : View
Products Affected
linux
- linux_kernel
CWE
