CVE-2021-47421

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: handle the case of pci_channel_io_frozen only in amdgpu_pci_resume In current code, when a PCI error state pci_channel_io_normal is detectd, it will report PCI_ERS_RESULT_CAN_RECOVER status to PCI driver, and PCI driver will continue the execution of PCI resume callback report_resume by pci_walk_bridge, and the callback will go into amdgpu_pci_resume finally, where write lock is releasd unconditionally without acquiring such lock first. In this case, a deadlock will happen when other threads start to acquire the read lock. To fix this, add a member in amdgpu_device strucutre to cache pci_channel_state, and only continue the execution in amdgpu_pci_resume when it's pci_channel_io_frozen.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:*

History

25 Sep 2025, 16:09

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-667
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/248b061689a40f4fed05252ee2c89f87cf26d7d8 - () https://git.kernel.org/stable/c/248b061689a40f4fed05252ee2c89f87cf26d7d8 - Patch
References () https://git.kernel.org/stable/c/72e9a1bf9b722628c28092e0c2cd8717edd201dc - () https://git.kernel.org/stable/c/72e9a1bf9b722628c28092e0c2cd8717edd201dc - Patch
References () https://git.kernel.org/stable/c/785cc093b6b5a93cc350421a55f3f1eda6585156 - () https://git.kernel.org/stable/c/785cc093b6b5a93cc350421a55f3f1eda6585156 - Patch

28 Aug 2025, 15:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/785cc093b6b5a93cc350421a55f3f1eda6585156 -

Information

Published : 2024-05-21 15:15

Updated : 2025-09-25 16:09


NVD link : CVE-2021-47421

Mitre link : CVE-2021-47421

CVE.ORG link : CVE-2021-47421


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-667

Improper Locking