Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: mac80211: fix deadlock in AP/VLAN handling Syzbot reports that when you have AP_VLAN interfaces that are up and close the AP interface they belong to, we get a deadlock. No surprise - since we dev_close() them with the wiphy mutex held, which goes back into the netdev notifier in cfg80211 and tries to acquire the wiphy mutex there. To fix this, we need to do two things: 1) prevent changing iftype while AP_VLANs are up, we can't easily fix this case since cfg80211 already calls us with the wiphy mutex held, but change_interface() is relatively rare in drivers anyway, so changing iftype isn't used much (and userspace has to fall back to down/change/up anyway) 2) pull the dev_close() loop over VLANs out of the wiphy mutex section in the normal stop case
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.12, < 5.12.13 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/8043903fcb72f545c52e3ec74d6fd82ef79ce7c5Patch
- https://git.kernel.org/stable/c/d5befb224edbe53056c2c18999d630dafb4a08b9Patch
- https://git.kernel.org/stable/c/8043903fcb72f545c52e3ec74d6fd82ef79ce7c5Patch
- https://git.kernel.org/stable/c/d5befb224edbe53056c2c18999d630dafb4a08b9Patch
FAQ
What is CVE-2021-47225?
CVE-2021-47225 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: mac80211: fix deadlock in AP/VLAN handling Syzbot reports that when you have AP_VLAN interfaces that are up and close the AP inter...
How severe is CVE-2021-47225?
CVE-2021-47225 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-47225?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.