{"id":"CVE-2021-47095","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nipmi: ssif: initialize ssif_info-\u003eclient early\n\nDuring probe ssif_info-\u003eclient is dereferenced in error path. However,\nit is set when some of the error checking has already been done. This\ncauses following kernel crash if an error path is taken:\n\n[   30.645593][  T674] ipmi_ssif 0-000e: ipmi_ssif: Not probing, Interface already present\n[   30.657616][  T674] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000088\n...\n[   30.657723][  T674] pc : __dev_printk+0x28/0xa0\n[   30.657732][  T674] lr : _dev_err+0x7c/0xa0\n...\n[   30.657772][  T674] Call trace:\n[   30.657775][  T674]  __dev_printk+0x28/0xa0\n[   30.657778][  T674]  _dev_err+0x7c/0xa0\n[   30.657781][  T674]  ssif_probe+0x548/0x900 [ipmi_ssif 62ce4b08badc1458fd896206d9ef69a3c31f3d3e]\n[   30.657791][  T674]  i2c_device_probe+0x37c/0x3c0\n...\n\nInitialize ssif_info-\u003eclient before any error path can be taken. Clear\ni2c_client data in the error path to prevent the dangling pointer from\nleaking.","modified":"2026-03-13T05:18:01.782063Z","published":"2024-03-04T18:15:07.907Z","related":["SUSE-SU-2024:1320-1","SUSE-SU-2024:1321-1","SUSE-SU-2024:1465-1","SUSE-SU-2024:1466-1","SUSE-SU-2024:1480-1","SUSE-SU-2024:1489-1","SUSE-SU-2024:1490-1"],"references":[{"type":"FIX","url":"https://git.kernel.org/stable/c/1f6ab847461ce7dd89ae9db2dd4658c993355d7c"},{"type":"FIX","url":"https://git.kernel.org/stable/c/34f35f8f14bc406efc06ee4ff73202c6fd245d15"},{"type":"FIX","url":"https://git.kernel.org/stable/c/77a7311ca167aa5b7055c549a940a56e73ee5f29"},{"type":"FIX","url":"https://git.kernel.org/stable/c/8efd6a3391f7b0b19fb0c38e50add06ca30c94af"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-47095.json","unresolved_ranges":[{"events":[{"introduced":"5.4"},{"fixed":"5.4.169"}]},{"events":[{"introduced":"5.5"},{"fixed":"5.10.89"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.15.12"}]},{"events":[{"introduced":"0"},{"last_affected":"5.16-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"5.16-rc2"}]},{"events":[{"introduced":"0"},{"last_affected":"5.16-rc3"}]},{"events":[{"introduced":"0"},{"last_affected":"5.16-rc4"}]},{"events":[{"introduced":"0"},{"last_affected":"5.16-rc5"}]},{"events":[{"introduced":"0"},{"last_affected":"5.16-rc6"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}