Skip to main content

CVE-2021-47045: Vulnerability in Linux Linux

High
VulnerabilityCVE-2021-47045cvecve-2021-47045
Published: Wed Feb 28 2024 (02/28/2024, 08:13:49 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb() It is possible to call lpfc_issue_els_plogi() passing a did for which no matching ndlp is found. A call is then made to lpfc_prep_els_iocb() with a null pointer to a lpfc_nodelist structure resulting in a null pointer dereference. Fix by returning an error status if no valid ndlp is found. Fix up comments regarding ndlp reference counting.

AI-Powered Analysis

AILast updated: 06/30/2025, 20:11:44 UTC

Technical Analysis

CVE-2021-47045 is a vulnerability identified in the Linux kernel's SCSI subsystem, specifically within the lpfc (LightPulse Fibre Channel) driver. The issue arises in the function lpfc_prep_els_iocb(), which is responsible for preparing ELS (Extended Link Service) IOCB (I/O Control Block) commands. The vulnerability occurs when the function lpfc_issue_els_plogi() is called with a destination identifier (did) for which no matching node list pointer (ndlp) exists. This leads to lpfc_prep_els_iocb() being invoked with a null pointer to the lpfc_nodelist structure. As a result, a null pointer dereference occurs, causing the kernel to crash or become unstable. The root cause is the lack of validation for the presence of a valid ndlp before proceeding with the preparation of the IOCB. The fix implemented involves returning an error status if no valid ndlp is found, preventing the null pointer dereference and improving the robustness of the driver. This vulnerability is a denial-of-service (DoS) type, as exploitation leads to kernel crashes, potentially causing system downtime or disruption of services relying on the affected Linux kernel versions. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The affected versions are specific commits identified by their hashes, indicating that the vulnerability is present in certain recent kernel builds prior to the fix. The issue is technical and low-level, affecting systems using the lpfc driver, which is typically employed in environments with Fibre Channel storage networks.

Potential Impact

For European organizations, the impact of CVE-2021-47045 primarily concerns systems running Linux kernels with the vulnerable lpfc driver enabled, especially those utilizing Fibre Channel storage solutions. The vulnerability can lead to kernel crashes and system instability, resulting in denial-of-service conditions. This can disrupt critical infrastructure, data centers, and enterprise storage environments that rely on high availability and data integrity. Organizations in sectors such as finance, healthcare, telecommunications, and manufacturing, which often deploy Linux-based servers with Fibre Channel storage, may face operational interruptions. Additionally, the downtime caused by kernel crashes could lead to data unavailability, impacting business continuity and potentially causing financial losses. Although no remote code execution or privilege escalation is indicated, the DoS impact on availability is significant in environments where uptime is critical. The absence of known exploits reduces immediate risk, but the vulnerability should be addressed promptly to prevent potential targeted attacks or accidental triggers leading to service disruption.

Mitigation Recommendations

To mitigate CVE-2021-47045, European organizations should: 1) Identify and inventory Linux systems running kernels with the vulnerable lpfc driver, focusing on those using Fibre Channel storage. 2) Apply the official Linux kernel patches or updates that include the fix for this vulnerability as soon as they become available. If immediate patching is not possible, consider temporarily disabling the lpfc driver if it is not essential to operations, or restrict access to systems with the vulnerable driver to trusted users only. 3) Implement monitoring for kernel crashes and system instability that could indicate exploitation attempts or accidental triggers of the vulnerability. 4) Review and enhance incident response plans to quickly address potential denial-of-service events caused by this vulnerability. 5) Coordinate with storage and hardware vendors to ensure compatibility and support for updated kernel versions. 6) Conduct thorough testing of patches in staging environments to prevent unintended disruptions in production. These steps go beyond generic advice by focusing on the specific driver and environment affected, emphasizing proactive identification, patch management, and operational controls tailored to Fibre Channel storage infrastructures.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-27T18:42:55.970Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9834c4522896dcbe9b84

Added to database: 5/21/2025, 9:09:08 AM

Last enriched: 6/30/2025, 8:11:44 PM

Last updated: 8/1/2025, 12:15:58 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats