blob: 6bfa2074eb404315a98f6c6f9d66427461cdb68e [file] [log] [blame]
The Linux kernel vulnerability CVE-2021-47077 occurs in the qedf_update_link_speed() function, specifically when the shost_data pointer is not initialized. This results in a NULL pointer dereference when trying to update supported_speeds.
The issue arises because the qedf_link_update() API is called from QED before shost_data is initialized. To fix this, a NULL pointer check has been added before dereferencing shost_data.
This vulnerability was introduced in kernel version 4.11 with commit 61d8658b4a43 and was fixed in versions 5.10.40 (commit a6362a737572), 5.12.7 (commit 11014efcec37), and 5.13 (commit 73578af92a0f). The affected file is drivers/scsi/qedf/qedf_main.c.
The Linux kernel CVE team recommends updating to the latest stable kernel version to resolve this issue, as individual changes are not tested alone and cherry-picking commits is not supported by the Linux kernel community. However, if updating is impossible, the individual fixes can be found at the provided commit links.