{"id":"CVE-2021-47565","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix kernel panic during drive powercycle test\n\nWhile looping over shost's sdev list it is possible that one\nof the drives is getting removed and its sas_target object is\nfreed but its sdev object remains intact.\n\nConsequently, a kernel panic can occur while the driver is trying to access\nthe sas_address field of sas_target object without also checking the\nsas_target object for NULL.","modified":"2026-03-15T22:43:15.364663Z","published":"2024-05-24T15:15:21.443Z","related":["SUSE-SU-2024:1979-1","SUSE-SU-2024:1983-1","SUSE-SU-2024:2008-1","SUSE-SU-2024:2010-1","SUSE-SU-2024:2011-1","SUSE-SU-2024:2019-1","SUSE-SU-2024:2183-1","SUSE-SU-2024:2184-1","SUSE-SU-2024:2185-1","SUSE-SU-2024:2189-1","SUSE-SU-2024:2190-1"],"references":[{"type":"FIX","url":"https://git.kernel.org/stable/c/5d4d50b1f159a5ebab7617f47121b4370aa58afe"},{"type":"FIX","url":"https://git.kernel.org/stable/c/7e324f734a914957b8cc3ff4b4c9f0409558adb5"},{"type":"FIX","url":"https://git.kernel.org/stable/c/8485649a7655e791a6e4e9f15b4d30fdae937184"},{"type":"FIX","url":"https://git.kernel.org/stable/c/dd035ca0e7a142870a970d46b1d19276cfe2bc8c"},{"type":"FIX","url":"https://git.kernel.org/stable/c/0d4b29eaadc1f59cec0c7e85eae77d08fcca9824"},{"type":"FIX","url":"https://git.kernel.org/stable/c/0ee4ba13e09c9d9c1cb6abb59da8295d9952328b"},{"type":"FIX","url":"https://git.kernel.org/stable/c/2bf9c5a5039c8f4b037236aed505e6a25c1d5f7b"},{"type":"FIX","url":"https://git.kernel.org/stable/c/58ef2c7a6de13721865d84b80eecf56d6cba0937"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"3.8"},{"fixed":"4.4.294"}]},{"events":[{"introduced":"4.5"},{"fixed":"4.9.292"}]},{"events":[{"introduced":"4.10"},{"fixed":"4.14.257"}]},{"events":[{"introduced":"4.15"},{"fixed":"4.19.219"}]},{"events":[{"introduced":"4.20"},{"fixed":"5.4.163"}]},{"events":[{"introduced":"5.5"},{"fixed":"5.10.83"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.15.6"}]},{"events":[{"introduced":"0"},{"last_affected":"5.16-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"5.16-rc2"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47565.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}