CVE-2021-47080: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Prevent divide-by-zero error triggered by the user The user_entry_size is supplied by the user and later used as a denominator to calculate number of entries. The zero supplied by the user will trigger the following divide-by-zero error: divide error: 0000 [#1] SMP KASAN PTI CPU: 4 PID: 497 Comm: c_repro Not tainted 5.13.0-rc1+ #281 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014 RIP: 0010:ib_uverbs_handler_UVERBS_METHOD_QUERY_GID_TABLE+0x1b1/0x510 Code: 87 59 03 00 00 e8 9f ab 1e ff 48 8d bd a8 00 00 00 e8 d3 70 41 ff 44 0f b7 b5 a8 00 00 00 e8 86 ab 1e ff 31 d2 4c 89 f0 31 ff <49> f7 f5 48 89 d6 48 89 54 24 10 48 89 04 24 e8 1b ad 1e ff 48 8b RSP: 0018:ffff88810416f828 EFLAGS: 00010246 RAX: 0000000000000008 RBX: 1ffff1102082df09 RCX: ffffffff82183f3d RDX: 0000000000000000 RSI: ffff888105f2da00 RDI: 0000000000000000 RBP: ffff88810416fa98 R08: 0000000000000001 R09: ffffed102082df5f R10: ffff88810416faf7 R11: ffffed102082df5e R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000008 R15: ffff88810416faf0 FS: 00007f5715efa740(0000) GS:ffff88811a700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020000840 CR3: 000000010c2e0001 CR4: 0000000000370ea0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: ? ib_uverbs_handler_UVERBS_METHOD_INFO_HANDLES+0x4b0/0x4b0 ib_uverbs_cmd_verbs+0x1546/0x1940 ib_uverbs_ioctl+0x186/0x240 __x64_sys_ioctl+0x38a/0x1220 do_syscall_64+0x3f/0x80 entry_SYSCALL_64_after_hwframe+0x44/0xae
AI Analysis
Technical Summary
CVE-2021-47080 is a vulnerability identified in the Linux kernel's RDMA (Remote Direct Memory Access) core subsystem. The issue arises from improper handling of a user-supplied parameter named user_entry_size, which is used as a denominator in a calculation to determine the number of entries. If a zero value is supplied by the user, it triggers a divide-by-zero error, leading to a kernel panic or crash. The vulnerability manifests as a divide error in the kernel, as demonstrated by the provided kernel stack trace, which shows the failure occurring in the function ib_uverbs_handler_UVERBS_METHOD_QUERY_GID_TABLE. This function is part of the Infiniband user verbs interface, which handles communication between user space and kernel space for RDMA operations. The root cause is the lack of validation on user_entry_size before it is used in division, allowing malicious or malformed input to cause a denial of service (DoS) by crashing the kernel. The vulnerability affects Linux kernel versions including the one referenced (5.13.0-rc1+), and the issue has been publicly disclosed and patched by the Linux project. No known exploits are reported in the wild at this time, and no CVSS score has been assigned. The vulnerability does not require authentication but does require user interaction in the form of issuing specific ioctl calls to the RDMA subsystem. Exploitation results in loss of availability due to kernel crash, but does not directly impact confidentiality or integrity. The vulnerability is technical in nature and specific to systems utilizing RDMA capabilities in the Linux kernel, which are typically found in high-performance computing, data centers, and enterprise environments.
Potential Impact
For European organizations, the primary impact of CVE-2021-47080 is the potential for denial of service on Linux systems that utilize RDMA functionality. RDMA is commonly used in data centers, cloud infrastructure, and high-performance computing clusters to enable low-latency, high-throughput networking. Organizations relying on such infrastructure for critical services could experience service interruptions or system downtime if this vulnerability is exploited. While the vulnerability does not allow privilege escalation or data breach directly, the resulting kernel panic could disrupt business operations, affect availability of services, and require system reboots and incident response. This is particularly relevant for sectors such as finance, telecommunications, research institutions, and cloud service providers in Europe that deploy Linux servers with RDMA support. The lack of known exploits reduces immediate risk, but the vulnerability should be addressed promptly to prevent potential future exploitation. Additionally, the vulnerability could be leveraged as part of a multi-stage attack to cause disruption or as a denial-of-service vector against targeted systems.
Mitigation Recommendations
European organizations should implement the following specific mitigation steps: 1) Apply the official Linux kernel patches that address CVE-2021-47080 as soon as they are available and tested in their environments. 2) If immediate patching is not feasible, restrict access to the RDMA user verbs interface (typically /dev/infiniband/uverbsX devices) by limiting permissions to trusted users and processes only, reducing the attack surface. 3) Monitor system logs and kernel messages for signs of divide-by-zero errors or kernel panics related to RDMA operations to detect potential exploitation attempts. 4) Employ kernel hardening techniques such as Kernel Address Sanitizer (KASAN) and Kernel Page Table Isolation (KPTI) where supported, which may help detect or mitigate kernel memory corruption issues. 5) For environments where RDMA is not required, consider disabling the RDMA kernel modules to eliminate exposure. 6) Incorporate this vulnerability into vulnerability management and incident response plans to ensure timely detection and remediation. 7) Coordinate with Linux distribution vendors for timely updates and advisories related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Italy, Spain
CVE-2021-47080: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Prevent divide-by-zero error triggered by the user The user_entry_size is supplied by the user and later used as a denominator to calculate number of entries. The zero supplied by the user will trigger the following divide-by-zero error: divide error: 0000 [#1] SMP KASAN PTI CPU: 4 PID: 497 Comm: c_repro Not tainted 5.13.0-rc1+ #281 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014 RIP: 0010:ib_uverbs_handler_UVERBS_METHOD_QUERY_GID_TABLE+0x1b1/0x510 Code: 87 59 03 00 00 e8 9f ab 1e ff 48 8d bd a8 00 00 00 e8 d3 70 41 ff 44 0f b7 b5 a8 00 00 00 e8 86 ab 1e ff 31 d2 4c 89 f0 31 ff <49> f7 f5 48 89 d6 48 89 54 24 10 48 89 04 24 e8 1b ad 1e ff 48 8b RSP: 0018:ffff88810416f828 EFLAGS: 00010246 RAX: 0000000000000008 RBX: 1ffff1102082df09 RCX: ffffffff82183f3d RDX: 0000000000000000 RSI: ffff888105f2da00 RDI: 0000000000000000 RBP: ffff88810416fa98 R08: 0000000000000001 R09: ffffed102082df5f R10: ffff88810416faf7 R11: ffffed102082df5e R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000008 R15: ffff88810416faf0 FS: 00007f5715efa740(0000) GS:ffff88811a700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020000840 CR3: 000000010c2e0001 CR4: 0000000000370ea0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: ? ib_uverbs_handler_UVERBS_METHOD_INFO_HANDLES+0x4b0/0x4b0 ib_uverbs_cmd_verbs+0x1546/0x1940 ib_uverbs_ioctl+0x186/0x240 __x64_sys_ioctl+0x38a/0x1220 do_syscall_64+0x3f/0x80 entry_SYSCALL_64_after_hwframe+0x44/0xae
AI-Powered Analysis
Technical Analysis
CVE-2021-47080 is a vulnerability identified in the Linux kernel's RDMA (Remote Direct Memory Access) core subsystem. The issue arises from improper handling of a user-supplied parameter named user_entry_size, which is used as a denominator in a calculation to determine the number of entries. If a zero value is supplied by the user, it triggers a divide-by-zero error, leading to a kernel panic or crash. The vulnerability manifests as a divide error in the kernel, as demonstrated by the provided kernel stack trace, which shows the failure occurring in the function ib_uverbs_handler_UVERBS_METHOD_QUERY_GID_TABLE. This function is part of the Infiniband user verbs interface, which handles communication between user space and kernel space for RDMA operations. The root cause is the lack of validation on user_entry_size before it is used in division, allowing malicious or malformed input to cause a denial of service (DoS) by crashing the kernel. The vulnerability affects Linux kernel versions including the one referenced (5.13.0-rc1+), and the issue has been publicly disclosed and patched by the Linux project. No known exploits are reported in the wild at this time, and no CVSS score has been assigned. The vulnerability does not require authentication but does require user interaction in the form of issuing specific ioctl calls to the RDMA subsystem. Exploitation results in loss of availability due to kernel crash, but does not directly impact confidentiality or integrity. The vulnerability is technical in nature and specific to systems utilizing RDMA capabilities in the Linux kernel, which are typically found in high-performance computing, data centers, and enterprise environments.
Potential Impact
For European organizations, the primary impact of CVE-2021-47080 is the potential for denial of service on Linux systems that utilize RDMA functionality. RDMA is commonly used in data centers, cloud infrastructure, and high-performance computing clusters to enable low-latency, high-throughput networking. Organizations relying on such infrastructure for critical services could experience service interruptions or system downtime if this vulnerability is exploited. While the vulnerability does not allow privilege escalation or data breach directly, the resulting kernel panic could disrupt business operations, affect availability of services, and require system reboots and incident response. This is particularly relevant for sectors such as finance, telecommunications, research institutions, and cloud service providers in Europe that deploy Linux servers with RDMA support. The lack of known exploits reduces immediate risk, but the vulnerability should be addressed promptly to prevent potential future exploitation. Additionally, the vulnerability could be leveraged as part of a multi-stage attack to cause disruption or as a denial-of-service vector against targeted systems.
Mitigation Recommendations
European organizations should implement the following specific mitigation steps: 1) Apply the official Linux kernel patches that address CVE-2021-47080 as soon as they are available and tested in their environments. 2) If immediate patching is not feasible, restrict access to the RDMA user verbs interface (typically /dev/infiniband/uverbsX devices) by limiting permissions to trusted users and processes only, reducing the attack surface. 3) Monitor system logs and kernel messages for signs of divide-by-zero errors or kernel panics related to RDMA operations to detect potential exploitation attempts. 4) Employ kernel hardening techniques such as Kernel Address Sanitizer (KASAN) and Kernel Page Table Isolation (KPTI) where supported, which may help detect or mitigate kernel memory corruption issues. 5) For environments where RDMA is not required, consider disabling the RDMA kernel modules to eliminate exposure. 6) Incorporate this vulnerability into vulnerability management and incident response plans to ensure timely detection and remediation. 7) Coordinate with Linux distribution vendors for timely updates and advisories related to this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-29T22:33:44.298Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9834c4522896dcbe9c84
Added to database: 5/21/2025, 9:09:08 AM
Last enriched: 6/30/2025, 9:10:37 PM
Last updated: 8/13/2025, 9:14:34 AM
Views: 11
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.