CVE-2021-47421
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/05/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
drm/amdgpu: handle the case of pci_channel_io_frozen only in amdgpu_pci_resume<br />
<br />
In current code, when a PCI error state pci_channel_io_normal is detectd,<br />
it will report PCI_ERS_RESULT_CAN_RECOVER status to PCI driver, and PCI<br />
driver will continue the execution of PCI resume callback report_resume by<br />
pci_walk_bridge, and the callback will go into amdgpu_pci_resume<br />
finally, where write lock is releasd unconditionally without acquiring<br />
such lock first. In this case, a deadlock will happen when other threads<br />
start to acquire the read lock.<br />
<br />
To fix this, add a member in amdgpu_device strucutre to cache<br />
pci_channel_state, and only continue the execution in amdgpu_pci_resume<br />
when it&#39;s pci_channel_io_frozen.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10 (including) | 5.10.241 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.14.12 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/248b061689a40f4fed05252ee2c89f87cf26d7d8
- https://git.kernel.org/stable/c/72e9a1bf9b722628c28092e0c2cd8717edd201dc
- https://git.kernel.org/stable/c/785cc093b6b5a93cc350421a55f3f1eda6585156
- https://git.kernel.org/stable/c/248b061689a40f4fed05252ee2c89f87cf26d7d8
- https://git.kernel.org/stable/c/72e9a1bf9b722628c28092e0c2cd8717edd201dc
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html



