Skip to main content

CVE-2021-47345: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2021-47345cvecve-2021-47345
Published: Tue May 21 2024 (05/21/2024, 14:35:51 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: RDMA/cma: Fix rdma_resolve_route() memory leak Fix a memory leak when "mda_resolve_route() is called more than once on the same "rdma_cm_id". This is possible if cma_query_handler() triggers the RDMA_CM_EVENT_ROUTE_ERROR flow which puts the state machine back and allows rdma_resolve_route() to be called again.

AI-Powered Analysis

AILast updated: 06/26/2025, 10:37:03 UTC

Technical Analysis

CVE-2021-47345 is a vulnerability identified in the Linux kernel's RDMA (Remote Direct Memory Access) subsystem, specifically within the Connection Manager Agent (CMA) component. The issue arises from a memory leak in the function rdma_resolve_route(), which occurs when this function is invoked multiple times on the same rdma_cm_id object. This situation can happen if the cma_query_handler() triggers the RDMA_CM_EVENT_ROUTE_ERROR event, causing the RDMA state machine to revert and allowing repeated calls to rdma_resolve_route(). The memory leak results from the failure to properly release allocated memory during these repeated route resolution attempts. While this vulnerability does not directly allow code execution or privilege escalation, it can lead to resource exhaustion on affected systems, potentially degrading performance or causing denial of service (DoS) conditions. The vulnerability affects Linux kernel versions identified by the commit hash 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 and similar builds. No known exploits have been reported in the wild, and no CVSS score has been assigned yet. The issue has been addressed by patching the kernel to ensure proper memory management during repeated rdma_resolve_route() calls, preventing the leak.

Potential Impact

For European organizations, the impact of CVE-2021-47345 primarily concerns systems utilizing RDMA technology, which is common in high-performance computing (HPC), data centers, and enterprise environments requiring low-latency, high-throughput networking. Memory leaks can accumulate over time, leading to increased memory consumption, degraded system performance, and ultimately denial of service if the system runs out of memory. This can disrupt critical services, especially in sectors relying on Linux-based infrastructure for data processing, cloud services, or scientific computing. While the vulnerability does not directly compromise confidentiality or integrity, availability can be affected, potentially impacting business continuity. Organizations with large-scale RDMA deployments, such as research institutions, financial services, and telecommunications providers in Europe, may experience operational disruptions if unpatched. However, the absence of known exploits reduces immediate risk, though proactive patching is advised to prevent future exploitation or accidental service degradation.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel to the patched versions that address CVE-2021-47345. Specifically, they should: 1) Identify all systems running Linux kernels with the affected commit or versions utilizing RDMA CMA components. 2) Apply vendor-provided kernel patches or upgrade to the latest stable kernel releases that include the fix. 3) Monitor RDMA-related logs and system memory usage to detect abnormal increases that could indicate exploitation or memory leaks. 4) Implement resource limits and watchdog mechanisms to prevent system-wide impact from memory exhaustion. 5) For critical environments, consider isolating RDMA workloads or limiting exposure to untrusted networks to reduce attack surface. 6) Engage with Linux distribution vendors for backported patches if using long-term support kernels. These steps go beyond generic advice by focusing on RDMA-specific monitoring and resource management, which are crucial given the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-21T14:28:16.980Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9835c4522896dcbea513

Added to database: 5/21/2025, 9:09:09 AM

Last enriched: 6/26/2025, 10:37:03 AM

Last updated: 7/29/2025, 4:58:28 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats