CVE-2021-47382: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: s390/qeth: fix deadlock during failing recovery Commit 0b9902c1fcc5 ("s390/qeth: fix deadlock during recovery") removed taking discipline_mutex inside qeth_do_reset(), fixing potential deadlocks. An error path was missed though, that still takes discipline_mutex and thus has the original deadlock potential. Intermittent deadlocks were seen when a qeth channel path is configured offline, causing a race between qeth_do_reset and ccwgroup_remove. Call qeth_set_offline() directly in the qeth_do_reset() error case and then a new variant of ccwgroup_set_offline(), without taking discipline_mutex.
AI Analysis
Technical Summary
CVE-2021-47382 is a vulnerability identified in the Linux kernel specifically affecting the s390 architecture's qeth network driver. The issue arises from a deadlock condition during error recovery in the qeth_do_reset() function. The vulnerability stems from improper handling of the discipline_mutex lock within the error path of the recovery process. Initially, a commit (0b9902c1fcc5) aimed to fix deadlocks by removing the acquisition of discipline_mutex inside qeth_do_reset(), but an error path was overlooked that still acquires this mutex, thus preserving the potential for deadlocks. The deadlock occurs intermittently when a qeth channel path is configured offline, due to a race condition between qeth_do_reset and ccwgroup_remove functions. The fix involves calling qeth_set_offline() directly in the error case of qeth_do_reset() and introducing a new variant of ccwgroup_set_offline() that does not acquire discipline_mutex, thereby preventing the deadlock. This vulnerability is specific to the s390 platform, which is IBM's mainframe architecture, and affects certain Linux kernel versions identified by specific commit hashes. No known exploits are reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2021-47382 is primarily relevant to those operating IBM mainframe systems running Linux with the affected qeth driver versions. The deadlock can cause system hangs or degraded network functionality, potentially leading to denial of service conditions on critical network paths. This can disrupt business operations, especially in sectors relying on mainframe systems for transaction processing, such as banking, insurance, and government services. While the vulnerability does not appear to allow privilege escalation or remote code execution, the availability impact on critical infrastructure could be significant. Organizations with high availability requirements may experience operational interruptions, impacting service delivery and compliance with uptime SLAs. Since no known exploits exist, the immediate risk is moderate, but the presence of a deadlock in kernel networking code warrants prompt attention to avoid potential future exploitation or accidental outages.
Mitigation Recommendations
European organizations using Linux on s390 mainframe architectures should promptly apply the patch that addresses this deadlock by updating to a Linux kernel version containing the fix (post commit 0b9902c1fcc5 with the additional error path correction). Specific mitigation steps include: 1) Identify all systems running the affected qeth driver versions and confirm kernel versions against the fixed commits. 2) Schedule kernel updates during maintenance windows to minimize operational impact. 3) Test the updated kernel in a staging environment to ensure no regressions in network functionality. 4) Monitor system logs for signs of qeth-related deadlocks or network path offline events. 5) Implement proactive monitoring and alerting for network interface states on s390 systems. 6) Engage with Linux distribution vendors or IBM support for backported patches if using enterprise Linux distributions on mainframes. 7) Document and review recovery procedures in case of deadlocks to reduce downtime. These steps go beyond generic advice by focusing on the unique s390 environment and the specific qeth driver behavior.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Switzerland
CVE-2021-47382: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: s390/qeth: fix deadlock during failing recovery Commit 0b9902c1fcc5 ("s390/qeth: fix deadlock during recovery") removed taking discipline_mutex inside qeth_do_reset(), fixing potential deadlocks. An error path was missed though, that still takes discipline_mutex and thus has the original deadlock potential. Intermittent deadlocks were seen when a qeth channel path is configured offline, causing a race between qeth_do_reset and ccwgroup_remove. Call qeth_set_offline() directly in the qeth_do_reset() error case and then a new variant of ccwgroup_set_offline(), without taking discipline_mutex.
AI-Powered Analysis
Technical Analysis
CVE-2021-47382 is a vulnerability identified in the Linux kernel specifically affecting the s390 architecture's qeth network driver. The issue arises from a deadlock condition during error recovery in the qeth_do_reset() function. The vulnerability stems from improper handling of the discipline_mutex lock within the error path of the recovery process. Initially, a commit (0b9902c1fcc5) aimed to fix deadlocks by removing the acquisition of discipline_mutex inside qeth_do_reset(), but an error path was overlooked that still acquires this mutex, thus preserving the potential for deadlocks. The deadlock occurs intermittently when a qeth channel path is configured offline, due to a race condition between qeth_do_reset and ccwgroup_remove functions. The fix involves calling qeth_set_offline() directly in the error case of qeth_do_reset() and introducing a new variant of ccwgroup_set_offline() that does not acquire discipline_mutex, thereby preventing the deadlock. This vulnerability is specific to the s390 platform, which is IBM's mainframe architecture, and affects certain Linux kernel versions identified by specific commit hashes. No known exploits are reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2021-47382 is primarily relevant to those operating IBM mainframe systems running Linux with the affected qeth driver versions. The deadlock can cause system hangs or degraded network functionality, potentially leading to denial of service conditions on critical network paths. This can disrupt business operations, especially in sectors relying on mainframe systems for transaction processing, such as banking, insurance, and government services. While the vulnerability does not appear to allow privilege escalation or remote code execution, the availability impact on critical infrastructure could be significant. Organizations with high availability requirements may experience operational interruptions, impacting service delivery and compliance with uptime SLAs. Since no known exploits exist, the immediate risk is moderate, but the presence of a deadlock in kernel networking code warrants prompt attention to avoid potential future exploitation or accidental outages.
Mitigation Recommendations
European organizations using Linux on s390 mainframe architectures should promptly apply the patch that addresses this deadlock by updating to a Linux kernel version containing the fix (post commit 0b9902c1fcc5 with the additional error path correction). Specific mitigation steps include: 1) Identify all systems running the affected qeth driver versions and confirm kernel versions against the fixed commits. 2) Schedule kernel updates during maintenance windows to minimize operational impact. 3) Test the updated kernel in a staging environment to ensure no regressions in network functionality. 4) Monitor system logs for signs of qeth-related deadlocks or network path offline events. 5) Implement proactive monitoring and alerting for network interface states on s390 systems. 6) Engage with Linux distribution vendors or IBM support for backported patches if using enterprise Linux distributions on mainframes. 7) Document and review recovery procedures in case of deadlocks to reduce downtime. These steps go beyond generic advice by focusing on the unique s390 environment and the specific qeth driver behavior.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-21T14:58:30.812Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9822c4522896dcbde0b7
Added to database: 5/21/2025, 9:08:50 AM
Last enriched: 6/28/2025, 5:10:15 AM
Last updated: 8/17/2025, 9:50:35 PM
Views: 15
Related Threats
CVE-2025-57703: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumCVE-2025-57702: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumCVE-2025-57701: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumCVE-2025-57700: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
HighCVE-2025-9109: Observable Response Discrepancy in Portabilis i-Diario
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.