CVE-2021-47198
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
10/04/2024
Last modified:
10/01/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
scsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routine<br />
<br />
An error is detected with the following report when unloading the driver:<br />
"KASAN: use-after-free in lpfc_unreg_rpi+0x1b1b"<br />
<br />
The NLP_REG_LOGIN_SEND nlp_flag is set in lpfc_reg_fab_ctrl_node(), but the<br />
flag is not cleared upon completion of the login.<br />
<br />
This allows a second call to lpfc_unreg_rpi() to proceed with nlp_rpi set<br />
to LPFC_RPI_ALLOW_ERROR. This results in a use after free access when used<br />
as an rpi_ids array index.<br />
<br />
Fix by clearing the NLP_REG_LOGIN_SEND nlp_flag in<br />
lpfc_mbx_cmpl_fc_reg_login().
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.14 (including) | 5.15.5 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



