{"id":"CVE-2021-47480","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Put LLD module refcnt after SCSI device is released\n\nSCSI host release is triggered when SCSI device is freed. We have to make\nsure that the low-level device driver module won't be unloaded before SCSI\nhost instance is released because shost-\u003ehostt is required in the release\nhandler.\n\nMake sure to put LLD module refcnt after SCSI device is released.\n\nFixes a kernel panic of 'BUG: unable to handle page fault for address'\nreported by Changhui and Yi.","modified":"2026-03-15T22:43:13.795782Z","published":"2024-05-22T09:15:09.907Z","related":["SUSE-SU-2024:1979-1","SUSE-SU-2024:1983-1","SUSE-SU-2024:2008-1","SUSE-SU-2024:2010-1","SUSE-SU-2024:2011-1","SUSE-SU-2024:2019-1","SUSE-SU-2024:2184-1","SUSE-SU-2024:2185-1","SUSE-SU-2024:2189-1","SUSE-SU-2024:2190-1"],"references":[{"type":"FIX","url":"https://git.kernel.org/stable/c/f30822c0b4c35ec86187ab055263943dc71a6836"},{"type":"FIX","url":"https://git.kernel.org/stable/c/1105573d964f7b78734348466b01f5f6ba8a1813"},{"type":"FIX","url":"https://git.kernel.org/stable/c/1ce287eff9f23181d5644db787f472463a61f68b"},{"type":"FIX","url":"https://git.kernel.org/stable/c/61a0faa89f21861d1f8d059123b5c285a5d9ffee"},{"type":"FIX","url":"https://git.kernel.org/stable/c/7b57c38d12aed1b5d92f74748bed25e0d041729f"},{"type":"FIX","url":"https://git.kernel.org/stable/c/8e4814a461787e15a31d322d9efbe0d4f6822428"},{"type":"FIX","url":"https://git.kernel.org/stable/c/c2df161f69fb1c67f63adbd193368b47f511edc0"},{"type":"FIX","url":"https://git.kernel.org/stable/c/f2b85040acec9a928b4eb1b57a989324e8e38d3f"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.292"}]},{"events":[{"introduced":"4.5"},{"fixed":"4.9.290"}]},{"events":[{"introduced":"4.10"},{"fixed":"4.14.255"}]},{"events":[{"introduced":"4.15"},{"fixed":"4.19.216"}]},{"events":[{"introduced":"4.20"},{"fixed":"5.4.158"}]},{"events":[{"introduced":"5.5"},{"fixed":"5.10.78"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.14.17"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc2"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc3"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc4"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc5"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc6"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47480.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}