CVE-2021-47203
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
10/04/2024
Last modified:
27/03/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()<br />
<br />
When parsing the txq list in lpfc_drain_txq(), the driver attempts to pass<br />
the requests to the adapter. If such an attempt fails, a local "fail_msg"<br />
string is set and a log message output. The job is then added to a<br />
completions list for cancellation.<br />
<br />
Processing of any further jobs from the txq list continues, but since<br />
"fail_msg" remains set, jobs are added to the completions list regardless<br />
of whether a wqe was passed to the adapter. If successfully added to<br />
txcmplq, jobs are added to both lists resulting in list corruption.<br />
<br />
Fix by clearing the fail_msg string after adding a job to the completions<br />
list. This stops the subsequent jobs from being added to the completions<br />
list unless they had an appropriate failure.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.4.293 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.5 (including) | 4.9.291 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.10 (including) | 4.14.256 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.218 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.162 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.82 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.5 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/16bcbfb56d759c25665f786e33ec633b9508a08f
- https://git.kernel.org/stable/c/814d3610c4ce86e8cf285b2cdac0057a42e82de5
- https://git.kernel.org/stable/c/99154581b05c8fb22607afb7c3d66c1bace6aa5d
- https://git.kernel.org/stable/c/ad4776b5eb2e58af1226847fcd3b4f6d051674dd
- https://git.kernel.org/stable/c/b291d147d0268e93ad866f8bc820ea14497abc9b
- https://git.kernel.org/stable/c/c097bd5a59162156d9c2077a2f58732ffbaa9fca
- https://git.kernel.org/stable/c/ec70d80a8642900086447ba0cdc79e3f44d42e8f
- https://git.kernel.org/stable/c/f05a0191b90156e539cccc189b9d87ca2a4d9305
- https://git.kernel.org/stable/c/16bcbfb56d759c25665f786e33ec633b9508a08f
- https://git.kernel.org/stable/c/814d3610c4ce86e8cf285b2cdac0057a42e82de5
- https://git.kernel.org/stable/c/99154581b05c8fb22607afb7c3d66c1bace6aa5d
- https://git.kernel.org/stable/c/ad4776b5eb2e58af1226847fcd3b4f6d051674dd
- https://git.kernel.org/stable/c/b291d147d0268e93ad866f8bc820ea14497abc9b
- https://git.kernel.org/stable/c/c097bd5a59162156d9c2077a2f58732ffbaa9fca
- https://git.kernel.org/stable/c/ec70d80a8642900086447ba0cdc79e3f44d42e8f
- https://git.kernel.org/stable/c/f05a0191b90156e539cccc189b9d87ca2a4d9305



