CVE-2021-47345: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: RDMA/cma: Fix rdma_resolve_route() memory leak Fix a memory leak when "mda_resolve_route() is called more than once on the same "rdma_cm_id". This is possible if cma_query_handler() triggers the RDMA_CM_EVENT_ROUTE_ERROR flow which puts the state machine back and allows rdma_resolve_route() to be called again.
AI Analysis
Technical Summary
CVE-2021-47345 is a vulnerability identified in the Linux kernel's RDMA (Remote Direct Memory Access) subsystem, specifically within the Connection Manager Agent (CMA) component. The issue arises from a memory leak in the function rdma_resolve_route(), which occurs when this function is invoked multiple times on the same rdma_cm_id object. This situation can happen if the cma_query_handler() triggers the RDMA_CM_EVENT_ROUTE_ERROR event, causing the RDMA state machine to revert and allowing repeated calls to rdma_resolve_route(). The memory leak results from the failure to properly release allocated memory during these repeated route resolution attempts. While this vulnerability does not directly allow code execution or privilege escalation, it can lead to resource exhaustion on affected systems, potentially degrading performance or causing denial of service (DoS) conditions. The vulnerability affects Linux kernel versions identified by the commit hash 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 and similar builds. No known exploits have been reported in the wild, and no CVSS score has been assigned yet. The issue has been addressed by patching the kernel to ensure proper memory management during repeated rdma_resolve_route() calls, preventing the leak.
Potential Impact
For European organizations, the impact of CVE-2021-47345 primarily concerns systems utilizing RDMA technology, which is common in high-performance computing (HPC), data centers, and enterprise environments requiring low-latency, high-throughput networking. Memory leaks can accumulate over time, leading to increased memory consumption, degraded system performance, and ultimately denial of service if the system runs out of memory. This can disrupt critical services, especially in sectors relying on Linux-based infrastructure for data processing, cloud services, or scientific computing. While the vulnerability does not directly compromise confidentiality or integrity, availability can be affected, potentially impacting business continuity. Organizations with large-scale RDMA deployments, such as research institutions, financial services, and telecommunications providers in Europe, may experience operational disruptions if unpatched. However, the absence of known exploits reduces immediate risk, though proactive patching is advised to prevent future exploitation or accidental service degradation.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel to the patched versions that address CVE-2021-47345. Specifically, they should: 1) Identify all systems running Linux kernels with the affected commit or versions utilizing RDMA CMA components. 2) Apply vendor-provided kernel patches or upgrade to the latest stable kernel releases that include the fix. 3) Monitor RDMA-related logs and system memory usage to detect abnormal increases that could indicate exploitation or memory leaks. 4) Implement resource limits and watchdog mechanisms to prevent system-wide impact from memory exhaustion. 5) For critical environments, consider isolating RDMA workloads or limiting exposure to untrusted networks to reduce attack surface. 6) Engage with Linux distribution vendors for backported patches if using long-term support kernels. These steps go beyond generic advice by focusing on RDMA-specific monitoring and resource management, which are crucial given the nature of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Switzerland, Italy, Spain, Belgium
CVE-2021-47345: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: RDMA/cma: Fix rdma_resolve_route() memory leak Fix a memory leak when "mda_resolve_route() is called more than once on the same "rdma_cm_id". This is possible if cma_query_handler() triggers the RDMA_CM_EVENT_ROUTE_ERROR flow which puts the state machine back and allows rdma_resolve_route() to be called again.
AI-Powered Analysis
Technical Analysis
CVE-2021-47345 is a vulnerability identified in the Linux kernel's RDMA (Remote Direct Memory Access) subsystem, specifically within the Connection Manager Agent (CMA) component. The issue arises from a memory leak in the function rdma_resolve_route(), which occurs when this function is invoked multiple times on the same rdma_cm_id object. This situation can happen if the cma_query_handler() triggers the RDMA_CM_EVENT_ROUTE_ERROR event, causing the RDMA state machine to revert and allowing repeated calls to rdma_resolve_route(). The memory leak results from the failure to properly release allocated memory during these repeated route resolution attempts. While this vulnerability does not directly allow code execution or privilege escalation, it can lead to resource exhaustion on affected systems, potentially degrading performance or causing denial of service (DoS) conditions. The vulnerability affects Linux kernel versions identified by the commit hash 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 and similar builds. No known exploits have been reported in the wild, and no CVSS score has been assigned yet. The issue has been addressed by patching the kernel to ensure proper memory management during repeated rdma_resolve_route() calls, preventing the leak.
Potential Impact
For European organizations, the impact of CVE-2021-47345 primarily concerns systems utilizing RDMA technology, which is common in high-performance computing (HPC), data centers, and enterprise environments requiring low-latency, high-throughput networking. Memory leaks can accumulate over time, leading to increased memory consumption, degraded system performance, and ultimately denial of service if the system runs out of memory. This can disrupt critical services, especially in sectors relying on Linux-based infrastructure for data processing, cloud services, or scientific computing. While the vulnerability does not directly compromise confidentiality or integrity, availability can be affected, potentially impacting business continuity. Organizations with large-scale RDMA deployments, such as research institutions, financial services, and telecommunications providers in Europe, may experience operational disruptions if unpatched. However, the absence of known exploits reduces immediate risk, though proactive patching is advised to prevent future exploitation or accidental service degradation.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel to the patched versions that address CVE-2021-47345. Specifically, they should: 1) Identify all systems running Linux kernels with the affected commit or versions utilizing RDMA CMA components. 2) Apply vendor-provided kernel patches or upgrade to the latest stable kernel releases that include the fix. 3) Monitor RDMA-related logs and system memory usage to detect abnormal increases that could indicate exploitation or memory leaks. 4) Implement resource limits and watchdog mechanisms to prevent system-wide impact from memory exhaustion. 5) For critical environments, consider isolating RDMA workloads or limiting exposure to untrusted networks to reduce attack surface. 6) Engage with Linux distribution vendors for backported patches if using long-term support kernels. These steps go beyond generic advice by focusing on RDMA-specific monitoring and resource management, which are crucial given the nature of this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-21T14:28:16.980Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9835c4522896dcbea513
Added to database: 5/21/2025, 9:09:09 AM
Last enriched: 6/26/2025, 10:37:03 AM
Last updated: 7/29/2025, 4:58:28 PM
Views: 9
Related Threats
CVE-2025-9019: Heap-based Buffer Overflow in tcpreplay
LowCVE-2025-9017: Cross Site Scripting in PHPGurukul Zoo Management System
MediumCVE-2025-9051: SQL Injection in projectworlds Travel Management System
MediumCVE-2025-1929: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Risk Yazılım Teknolojileri Ltd. Şti. Reel Sektör Hazine ve Risk Yönetimi Yazılımı
HighCVE-2025-54475: CWE-89: Improper Neutralization of Special Elements used in an SQL Command in joomsky.com JS Jobs component for Joomla
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.