Skip to main content

CVE-2021-47382: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2021-47382cvecve-2021-47382
Published: Tue May 21 2024 (05/21/2024, 15:03:43 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: s390/qeth: fix deadlock during failing recovery Commit 0b9902c1fcc5 ("s390/qeth: fix deadlock during recovery") removed taking discipline_mutex inside qeth_do_reset(), fixing potential deadlocks. An error path was missed though, that still takes discipline_mutex and thus has the original deadlock potential. Intermittent deadlocks were seen when a qeth channel path is configured offline, causing a race between qeth_do_reset and ccwgroup_remove. Call qeth_set_offline() directly in the qeth_do_reset() error case and then a new variant of ccwgroup_set_offline(), without taking discipline_mutex.

AI-Powered Analysis

AILast updated: 06/28/2025, 05:10:15 UTC

Technical Analysis

CVE-2021-47382 is a vulnerability identified in the Linux kernel specifically affecting the s390 architecture's qeth network driver. The issue arises from a deadlock condition during error recovery in the qeth_do_reset() function. The vulnerability stems from improper handling of the discipline_mutex lock within the error path of the recovery process. Initially, a commit (0b9902c1fcc5) aimed to fix deadlocks by removing the acquisition of discipline_mutex inside qeth_do_reset(), but an error path was overlooked that still acquires this mutex, thus preserving the potential for deadlocks. The deadlock occurs intermittently when a qeth channel path is configured offline, due to a race condition between qeth_do_reset and ccwgroup_remove functions. The fix involves calling qeth_set_offline() directly in the error case of qeth_do_reset() and introducing a new variant of ccwgroup_set_offline() that does not acquire discipline_mutex, thereby preventing the deadlock. This vulnerability is specific to the s390 platform, which is IBM's mainframe architecture, and affects certain Linux kernel versions identified by specific commit hashes. No known exploits are reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the impact of CVE-2021-47382 is primarily relevant to those operating IBM mainframe systems running Linux with the affected qeth driver versions. The deadlock can cause system hangs or degraded network functionality, potentially leading to denial of service conditions on critical network paths. This can disrupt business operations, especially in sectors relying on mainframe systems for transaction processing, such as banking, insurance, and government services. While the vulnerability does not appear to allow privilege escalation or remote code execution, the availability impact on critical infrastructure could be significant. Organizations with high availability requirements may experience operational interruptions, impacting service delivery and compliance with uptime SLAs. Since no known exploits exist, the immediate risk is moderate, but the presence of a deadlock in kernel networking code warrants prompt attention to avoid potential future exploitation or accidental outages.

Mitigation Recommendations

European organizations using Linux on s390 mainframe architectures should promptly apply the patch that addresses this deadlock by updating to a Linux kernel version containing the fix (post commit 0b9902c1fcc5 with the additional error path correction). Specific mitigation steps include: 1) Identify all systems running the affected qeth driver versions and confirm kernel versions against the fixed commits. 2) Schedule kernel updates during maintenance windows to minimize operational impact. 3) Test the updated kernel in a staging environment to ensure no regressions in network functionality. 4) Monitor system logs for signs of qeth-related deadlocks or network path offline events. 5) Implement proactive monitoring and alerting for network interface states on s390 systems. 6) Engage with Linux distribution vendors or IBM support for backported patches if using enterprise Linux distributions on mainframes. 7) Document and review recovery procedures in case of deadlocks to reduce downtime. These steps go beyond generic advice by focusing on the unique s390 environment and the specific qeth driver behavior.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-21T14:58:30.812Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9822c4522896dcbde0b7

Added to database: 5/21/2025, 9:08:50 AM

Last enriched: 6/28/2025, 5:10:15 AM

Last updated: 8/17/2025, 9:50:35 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats