In the Linux kernel, the following vulnerability has been resolved: scsi:
lpfc: Fix link down processing to address NULL pointer dereference If an FC
link down transition while PLOGIs are outstanding to fabric well known
addresses, outstanding ABTS requests may result in a NULL pointer
dereference. Driver unload requests may hang with repeated “2878” log
messages. The Link down processing results in ABTS requests for outstanding
ELS requests. The Abort WQEs are sent for the ELSs before the driver had
set the link state to down. Thus the driver is sending the Abort with the
expectation that an ABTS will be sent on the wire. The Abort request is
stalled waiting for the link to come up. In some conditions the driver may
auto-complete the ELSs thus if the link does come up, the Abort completions
may reference an invalid structure. Fix by ensuring that Abort set the flag
to avoid link traffic if issued due to conditions where the link failed.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/1854f53ccd88ad4e7568ddfafafffe71f1ceb0a6 (5.16-rc1)
git.kernel.org/stable/c/1854f53ccd88ad4e7568ddfafafffe71f1ceb0a6
git.kernel.org/stable/c/28de48a7cea495ab48082d9ff4ef63f7cb4e563a
launchpad.net/bugs/cve/CVE-2021-47183
nvd.nist.gov/vuln/detail/CVE-2021-47183
security-tracker.debian.org/tracker/CVE-2021-47183
www.cve.org/CVERecord?id=CVE-2021-47183