Skip to main content

CVE-2021-47080: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2021-47080cvecve-2021-47080
Published: Fri Mar 01 2024 (03/01/2024, 21:15:15 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Prevent divide-by-zero error triggered by the user The user_entry_size is supplied by the user and later used as a denominator to calculate number of entries. The zero supplied by the user will trigger the following divide-by-zero error: divide error: 0000 [#1] SMP KASAN PTI CPU: 4 PID: 497 Comm: c_repro Not tainted 5.13.0-rc1+ #281 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014 RIP: 0010:ib_uverbs_handler_UVERBS_METHOD_QUERY_GID_TABLE+0x1b1/0x510 Code: 87 59 03 00 00 e8 9f ab 1e ff 48 8d bd a8 00 00 00 e8 d3 70 41 ff 44 0f b7 b5 a8 00 00 00 e8 86 ab 1e ff 31 d2 4c 89 f0 31 ff <49> f7 f5 48 89 d6 48 89 54 24 10 48 89 04 24 e8 1b ad 1e ff 48 8b RSP: 0018:ffff88810416f828 EFLAGS: 00010246 RAX: 0000000000000008 RBX: 1ffff1102082df09 RCX: ffffffff82183f3d RDX: 0000000000000000 RSI: ffff888105f2da00 RDI: 0000000000000000 RBP: ffff88810416fa98 R08: 0000000000000001 R09: ffffed102082df5f R10: ffff88810416faf7 R11: ffffed102082df5e R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000008 R15: ffff88810416faf0 FS: 00007f5715efa740(0000) GS:ffff88811a700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020000840 CR3: 000000010c2e0001 CR4: 0000000000370ea0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: ? ib_uverbs_handler_UVERBS_METHOD_INFO_HANDLES+0x4b0/0x4b0 ib_uverbs_cmd_verbs+0x1546/0x1940 ib_uverbs_ioctl+0x186/0x240 __x64_sys_ioctl+0x38a/0x1220 do_syscall_64+0x3f/0x80 entry_SYSCALL_64_after_hwframe+0x44/0xae

AI-Powered Analysis

AILast updated: 06/30/2025, 21:10:37 UTC

Technical Analysis

CVE-2021-47080 is a vulnerability identified in the Linux kernel's RDMA (Remote Direct Memory Access) core subsystem. The issue arises from improper handling of a user-supplied parameter named user_entry_size, which is used as a denominator in a calculation to determine the number of entries. If a zero value is supplied by the user, it triggers a divide-by-zero error, leading to a kernel panic or crash. The vulnerability manifests as a divide error in the kernel, as demonstrated by the provided kernel stack trace, which shows the failure occurring in the function ib_uverbs_handler_UVERBS_METHOD_QUERY_GID_TABLE. This function is part of the Infiniband user verbs interface, which handles communication between user space and kernel space for RDMA operations. The root cause is the lack of validation on user_entry_size before it is used in division, allowing malicious or malformed input to cause a denial of service (DoS) by crashing the kernel. The vulnerability affects Linux kernel versions including the one referenced (5.13.0-rc1+), and the issue has been publicly disclosed and patched by the Linux project. No known exploits are reported in the wild at this time, and no CVSS score has been assigned. The vulnerability does not require authentication but does require user interaction in the form of issuing specific ioctl calls to the RDMA subsystem. Exploitation results in loss of availability due to kernel crash, but does not directly impact confidentiality or integrity. The vulnerability is technical in nature and specific to systems utilizing RDMA capabilities in the Linux kernel, which are typically found in high-performance computing, data centers, and enterprise environments.

Potential Impact

For European organizations, the primary impact of CVE-2021-47080 is the potential for denial of service on Linux systems that utilize RDMA functionality. RDMA is commonly used in data centers, cloud infrastructure, and high-performance computing clusters to enable low-latency, high-throughput networking. Organizations relying on such infrastructure for critical services could experience service interruptions or system downtime if this vulnerability is exploited. While the vulnerability does not allow privilege escalation or data breach directly, the resulting kernel panic could disrupt business operations, affect availability of services, and require system reboots and incident response. This is particularly relevant for sectors such as finance, telecommunications, research institutions, and cloud service providers in Europe that deploy Linux servers with RDMA support. The lack of known exploits reduces immediate risk, but the vulnerability should be addressed promptly to prevent potential future exploitation. Additionally, the vulnerability could be leveraged as part of a multi-stage attack to cause disruption or as a denial-of-service vector against targeted systems.

Mitigation Recommendations

European organizations should implement the following specific mitigation steps: 1) Apply the official Linux kernel patches that address CVE-2021-47080 as soon as they are available and tested in their environments. 2) If immediate patching is not feasible, restrict access to the RDMA user verbs interface (typically /dev/infiniband/uverbsX devices) by limiting permissions to trusted users and processes only, reducing the attack surface. 3) Monitor system logs and kernel messages for signs of divide-by-zero errors or kernel panics related to RDMA operations to detect potential exploitation attempts. 4) Employ kernel hardening techniques such as Kernel Address Sanitizer (KASAN) and Kernel Page Table Isolation (KPTI) where supported, which may help detect or mitigate kernel memory corruption issues. 5) For environments where RDMA is not required, consider disabling the RDMA kernel modules to eliminate exposure. 6) Incorporate this vulnerability into vulnerability management and incident response plans to ensure timely detection and remediation. 7) Coordinate with Linux distribution vendors for timely updates and advisories related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-29T22:33:44.298Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9834c4522896dcbe9c84

Added to database: 5/21/2025, 9:09:08 AM

Last enriched: 6/30/2025, 9:10:37 PM

Last updated: 8/13/2025, 9:14:34 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats