Skip to main content

CVE-2021-47183: Vulnerability in Linux Linux

High
VulnerabilityCVE-2021-47183cvecve-2021-47183
Published: Wed Apr 10 2024 (04/10/2024, 18:56:24 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix link down processing to address NULL pointer dereference If an FC link down transition while PLOGIs are outstanding to fabric well known addresses, outstanding ABTS requests may result in a NULL pointer dereference. Driver unload requests may hang with repeated "2878" log messages. The Link down processing results in ABTS requests for outstanding ELS requests. The Abort WQEs are sent for the ELSs before the driver had set the link state to down. Thus the driver is sending the Abort with the expectation that an ABTS will be sent on the wire. The Abort request is stalled waiting for the link to come up. In some conditions the driver may auto-complete the ELSs thus if the link does come up, the Abort completions may reference an invalid structure. Fix by ensuring that Abort set the flag to avoid link traffic if issued due to conditions where the link failed.

AI-Powered Analysis

AILast updated: 06/26/2025, 18:05:45 UTC

Technical Analysis

CVE-2021-47183 is a vulnerability identified in the Linux kernel's Fibre Channel (FC) driver, specifically within the lpfc (LightPulse Fibre Channel) driver component. The issue arises during the handling of link down events on FC links when PLOGIs (Port Login requests) are outstanding to fabric well-known addresses. Under these conditions, outstanding ABTS (Abort Sequence) requests may cause a NULL pointer dereference. The root cause is linked to the sequence of operations during link down processing: the driver sends Abort Work Queue Elements (WQEs) for outstanding Extended Link Services (ELS) requests before the link state is set to down. This leads to the Abort requests being stalled, waiting for the link to come back up. In some cases, the driver auto-completes the ELS requests, and if the link does come back up, the Abort completions may reference invalid memory structures, resulting in a NULL pointer dereference. This can cause the driver to hang, particularly during driver unload requests, which manifest as repeated "2878" log messages. The fix implemented ensures that when an Abort is issued due to link failure conditions, a flag is set to avoid sending traffic on the link, preventing the invalid memory reference and stabilizing the driver behavior. This vulnerability affects Linux kernel versions identified by the given commit hashes and was published on April 10, 2024. No known exploits are reported in the wild at this time, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the impact of CVE-2021-47183 primarily concerns systems utilizing Linux servers with Fibre Channel storage connectivity, which is common in enterprise data centers and critical infrastructure environments. A NULL pointer dereference in the lpfc driver can lead to kernel crashes or hangs, resulting in denial of service (DoS) conditions on affected systems. This can disrupt access to storage resources, potentially halting business-critical applications relying on FC SAN (Storage Area Network) connectivity. Organizations in sectors such as finance, healthcare, telecommunications, and government, which often rely on high-availability storage solutions, may experience operational disruptions and data access issues. Although this vulnerability does not directly lead to privilege escalation or data leakage, the resulting system instability can cause downtime and complicate incident response. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to potential future exploitation or accidental triggering during normal operations or maintenance activities.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel to versions containing the patch for CVE-2021-47183. Specifically, kernel maintainers and system administrators should apply the fix that sets the appropriate flag to prevent Abort requests from sending traffic on a downed link. Beyond patching, organizations should audit their use of Fibre Channel storage drivers and monitor system logs for repeated "2878" messages or other signs of lpfc driver instability. Implementing proactive monitoring of FC link states and driver health can help detect early signs of this issue. For environments where immediate patching is not feasible, consider temporarily disabling or isolating affected FC interfaces to prevent triggering the vulnerability. Additionally, ensure that backup and recovery procedures are robust to mitigate potential downtime. Coordination with hardware vendors for firmware updates and driver support is also recommended to maintain overall storage stack stability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-03-25T09:12:14.112Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9835c4522896dcbe9fb2

Added to database: 5/21/2025, 9:09:09 AM

Last enriched: 6/26/2025, 6:05:45 PM

Last updated: 8/1/2025, 7:10:35 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats