Skip to main content

CVE-2021-47480: Vulnerability in Linux Linux

High
VulnerabilityCVE-2021-47480cvecve-2021-47480
Published: Wed May 22 2024 (05/22/2024, 08:19:32 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: core: Put LLD module refcnt after SCSI device is released SCSI host release is triggered when SCSI device is freed. We have to make sure that the low-level device driver module won't be unloaded before SCSI host instance is released because shost->hostt is required in the release handler. Make sure to put LLD module refcnt after SCSI device is released. Fixes a kernel panic of 'BUG: unable to handle page fault for address' reported by Changhui and Yi.

AI-Powered Analysis

AILast updated: 06/30/2025, 13:39:32 UTC

Technical Analysis

CVE-2021-47480 is a vulnerability identified in the Linux kernel's SCSI (Small Computer System Interface) subsystem. The issue arises from improper handling of the reference count for the low-level device driver (LLD) module during the release of SCSI devices. Specifically, when a SCSI device is freed, the SCSI host release process is triggered. The vulnerability occurs because the low-level device driver module's reference count is decremented before the SCSI host instance is fully released. Since the release handler requires access to the host's transport structure (shost->hostt), unloading the LLD module prematurely can lead to a kernel panic due to an invalid memory access, manifested as 'BUG: unable to handle page fault for address'. This flaw can cause system instability and crashes. The fix involves ensuring that the LLD module's reference count is decremented only after the SCSI device has been completely released, preventing premature unloading and avoiding the kernel panic. The vulnerability affects certain Linux kernel versions identified by specific commit hashes, and no known exploits are currently reported in the wild. No CVSS score has been assigned to this vulnerability yet.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running affected Linux kernel versions with SCSI devices, which are common in enterprise storage environments, data centers, and servers. A kernel panic triggered by this flaw can lead to unexpected system crashes, resulting in downtime, potential data loss, and disruption of critical services. Organizations relying on Linux-based infrastructure for storage or server operations may experience reduced availability and operational interruptions. While this vulnerability does not directly lead to privilege escalation or data breaches, the denial-of-service impact can affect business continuity, especially in sectors with high availability requirements such as finance, healthcare, telecommunications, and public services. Additionally, recovery from kernel panics may require manual intervention, increasing operational costs and incident response efforts.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Identify and inventory Linux systems running affected kernel versions, especially those managing SCSI devices. 2) Apply the official Linux kernel patches or upgrade to a kernel version where this issue is resolved, ensuring the LLD module reference counting is correctly handled. 3) Implement rigorous testing of kernel updates in staging environments to prevent regressions. 4) Monitor system logs for kernel panic messages related to SCSI device release to detect potential exploitation or triggering of this flaw. 5) For critical systems where immediate patching is not feasible, consider isolating or limiting workloads that heavily interact with SCSI devices to reduce exposure. 6) Maintain robust backup and recovery procedures to minimize impact from unexpected system crashes. 7) Engage with Linux distribution vendors for timely security updates and advisories.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-22T06:20:56.200Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9833c4522896dcbe9252

Added to database: 5/21/2025, 9:09:07 AM

Last enriched: 6/30/2025, 1:39:32 PM

Last updated: 8/13/2025, 2:17:53 AM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats