CVE-2021-47565

In the Linux kernel, the following vulnerability has been resolved: scsi: mpt3sas: Fix kernel panic during drive powercycle test While looping over shost's sdev list it is possible that one of the drives is getting removed and its sas_target object is freed but its sdev object remains intact. Consequently, a kernel panic can occur while the driver is trying to access the sas_address field of sas_target object without also checking the sas_target object for NULL.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*

History

18 Sep 2025, 15:41

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*
CWE CWE-476
CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://git.kernel.org/stable/c/0d4b29eaadc1f59cec0c7e85eae77d08fcca9824 - () https://git.kernel.org/stable/c/0d4b29eaadc1f59cec0c7e85eae77d08fcca9824 - Patch
References () https://git.kernel.org/stable/c/0ee4ba13e09c9d9c1cb6abb59da8295d9952328b - () https://git.kernel.org/stable/c/0ee4ba13e09c9d9c1cb6abb59da8295d9952328b - Patch
References () https://git.kernel.org/stable/c/2bf9c5a5039c8f4b037236aed505e6a25c1d5f7b - () https://git.kernel.org/stable/c/2bf9c5a5039c8f4b037236aed505e6a25c1d5f7b - Patch
References () https://git.kernel.org/stable/c/58ef2c7a6de13721865d84b80eecf56d6cba0937 - () https://git.kernel.org/stable/c/58ef2c7a6de13721865d84b80eecf56d6cba0937 - Patch
References () https://git.kernel.org/stable/c/5d4d50b1f159a5ebab7617f47121b4370aa58afe - () https://git.kernel.org/stable/c/5d4d50b1f159a5ebab7617f47121b4370aa58afe - Patch
References () https://git.kernel.org/stable/c/7e324f734a914957b8cc3ff4b4c9f0409558adb5 - () https://git.kernel.org/stable/c/7e324f734a914957b8cc3ff4b4c9f0409558adb5 - Patch
References () https://git.kernel.org/stable/c/8485649a7655e791a6e4e9f15b4d30fdae937184 - () https://git.kernel.org/stable/c/8485649a7655e791a6e4e9f15b4d30fdae937184 - Patch
References () https://git.kernel.org/stable/c/dd035ca0e7a142870a970d46b1d19276cfe2bc8c - () https://git.kernel.org/stable/c/dd035ca0e7a142870a970d46b1d19276cfe2bc8c - Patch

21 Nov 2024, 06:36

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: scsi: mpt3sas: solucionó el pánico del kernel durante la prueba de ciclo de energía de la unidad. Mientras se recorre la lista sdev de shost, es posible que una de las unidades se esté eliminando y su objeto sas_target se libere pero su objeto sdev permanece intacta. En consecuencia, puede ocurrir un pánico en el kernel mientras el controlador intenta acceder al campo sas_address del objeto sas_target sin verificar también si el objeto sas_target es NULL.
References () https://git.kernel.org/stable/c/0d4b29eaadc1f59cec0c7e85eae77d08fcca9824 - () https://git.kernel.org/stable/c/0d4b29eaadc1f59cec0c7e85eae77d08fcca9824 -
References () https://git.kernel.org/stable/c/0ee4ba13e09c9d9c1cb6abb59da8295d9952328b - () https://git.kernel.org/stable/c/0ee4ba13e09c9d9c1cb6abb59da8295d9952328b -
References () https://git.kernel.org/stable/c/2bf9c5a5039c8f4b037236aed505e6a25c1d5f7b - () https://git.kernel.org/stable/c/2bf9c5a5039c8f4b037236aed505e6a25c1d5f7b -
References () https://git.kernel.org/stable/c/58ef2c7a6de13721865d84b80eecf56d6cba0937 - () https://git.kernel.org/stable/c/58ef2c7a6de13721865d84b80eecf56d6cba0937 -
References () https://git.kernel.org/stable/c/5d4d50b1f159a5ebab7617f47121b4370aa58afe - () https://git.kernel.org/stable/c/5d4d50b1f159a5ebab7617f47121b4370aa58afe -
References () https://git.kernel.org/stable/c/7e324f734a914957b8cc3ff4b4c9f0409558adb5 - () https://git.kernel.org/stable/c/7e324f734a914957b8cc3ff4b4c9f0409558adb5 -
References () https://git.kernel.org/stable/c/8485649a7655e791a6e4e9f15b4d30fdae937184 - () https://git.kernel.org/stable/c/8485649a7655e791a6e4e9f15b4d30fdae937184 -
References () https://git.kernel.org/stable/c/dd035ca0e7a142870a970d46b1d19276cfe2bc8c - () https://git.kernel.org/stable/c/dd035ca0e7a142870a970d46b1d19276cfe2bc8c -

24 May 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-24 15:15

Updated : 2025-09-18 15:41


NVD link : CVE-2021-47565

Mitre link : CVE-2021-47565

CVE.ORG link : CVE-2021-47565


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free

CWE-476

NULL Pointer Dereference