CVE-2021-47392: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: RDMA/cma: Fix listener leak in rdma_cma_listen_on_all() failure If cma_listen_on_all() fails it leaves the per-device ID still on the listen_list but the state is not set to RDMA_CM_ADDR_BOUND. When the cmid is eventually destroyed cma_cancel_listens() is not called due to the wrong state, however the per-device IDs are still holding the refcount preventing the ID from being destroyed, thus deadlocking: task:rping state:D stack: 0 pid:19605 ppid: 47036 flags:0x00000084 Call Trace: __schedule+0x29a/0x780 ? free_unref_page_commit+0x9b/0x110 schedule+0x3c/0xa0 schedule_timeout+0x215/0x2b0 ? __flush_work+0x19e/0x1e0 wait_for_completion+0x8d/0xf0 _destroy_id+0x144/0x210 [rdma_cm] ucma_close_id+0x2b/0x40 [rdma_ucm] __destroy_id+0x93/0x2c0 [rdma_ucm] ? __xa_erase+0x4a/0xa0 ucma_destroy_id+0x9a/0x120 [rdma_ucm] ucma_write+0xb8/0x130 [rdma_ucm] vfs_write+0xb4/0x250 ksys_write+0xb5/0xd0 ? syscall_trace_enter.isra.19+0x123/0x190 do_syscall_64+0x33/0x40 entry_SYSCALL_64_after_hwframe+0x44/0xa9 Ensure that cma_listen_on_all() atomically unwinds its action under the lock during error.
AI Analysis
Technical Summary
CVE-2021-47392 is a vulnerability identified in the Linux kernel's RDMA (Remote Direct Memory Access) subsystem, specifically within the RDMA Connection Manager (rdma_cm) component. The issue arises in the function cma_listen_on_all(), which is responsible for setting up listeners on all devices for RDMA connections. When cma_listen_on_all() fails, it leaves per-device IDs on the listen_list without updating their state to RDMA_CM_ADDR_BOUND. This incorrect state prevents the proper invocation of cma_cancel_listens() during the destruction of the connection manager ID (cmid). As a result, the per-device IDs retain their reference counts and are not destroyed, leading to a deadlock scenario. The deadlock manifests as a blocked task waiting indefinitely, as shown in the provided kernel stack trace, which includes scheduling and destruction functions related to RDMA connection management. The root cause is a lack of atomic rollback or cleanup under the lock when cma_listen_on_all() encounters an error. This flaw can cause resource leaks and kernel deadlocks, potentially impacting system stability and availability. The vulnerability affects specific Linux kernel versions identified by commit hashes, and although no known exploits are reported in the wild, the issue is critical for environments utilizing RDMA for high-performance networking. The fix involves ensuring that cma_listen_on_all() properly unwinds its actions atomically under the lock during failure to prevent stale references and deadlocks.
Potential Impact
For European organizations, especially those operating data centers, HPC clusters, or financial trading platforms that rely on RDMA for low-latency, high-throughput networking, this vulnerability poses a significant risk to system availability and reliability. A deadlock in the kernel can cause service interruptions, requiring system reboots or manual intervention, which could lead to downtime and operational disruption. Organizations in sectors such as finance, research, telecommunications, and cloud service providers that deploy Linux servers with RDMA-enabled hardware are particularly vulnerable. The impact extends to any critical infrastructure relying on Linux kernels with affected versions, potentially affecting service-level agreements and causing financial and reputational damage. While the vulnerability does not directly expose confidentiality or integrity risks, the availability impact alone is substantial in environments where uptime and performance are critical.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions where this vulnerability is patched. Since the issue is related to specific commit versions, applying the latest stable kernel updates from trusted Linux distributions is essential. For environments where immediate patching is not feasible, administrators should consider disabling RDMA services or the rdma_cm module temporarily to mitigate the risk of deadlocks. Monitoring kernel logs for symptoms of deadlocks or resource leaks related to RDMA can help detect exploitation attempts or manifestation of the issue. Additionally, implementing robust kernel crash recovery and automated reboot mechanisms can reduce downtime impact. Organizations should also audit their RDMA usage and configurations to ensure minimal exposure. Engaging with hardware vendors for firmware and driver updates that complement kernel patches is advisable. Finally, thorough testing in staging environments before deploying patches in production will help avoid unintended disruptions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Switzerland, Italy
CVE-2021-47392: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: RDMA/cma: Fix listener leak in rdma_cma_listen_on_all() failure If cma_listen_on_all() fails it leaves the per-device ID still on the listen_list but the state is not set to RDMA_CM_ADDR_BOUND. When the cmid is eventually destroyed cma_cancel_listens() is not called due to the wrong state, however the per-device IDs are still holding the refcount preventing the ID from being destroyed, thus deadlocking: task:rping state:D stack: 0 pid:19605 ppid: 47036 flags:0x00000084 Call Trace: __schedule+0x29a/0x780 ? free_unref_page_commit+0x9b/0x110 schedule+0x3c/0xa0 schedule_timeout+0x215/0x2b0 ? __flush_work+0x19e/0x1e0 wait_for_completion+0x8d/0xf0 _destroy_id+0x144/0x210 [rdma_cm] ucma_close_id+0x2b/0x40 [rdma_ucm] __destroy_id+0x93/0x2c0 [rdma_ucm] ? __xa_erase+0x4a/0xa0 ucma_destroy_id+0x9a/0x120 [rdma_ucm] ucma_write+0xb8/0x130 [rdma_ucm] vfs_write+0xb4/0x250 ksys_write+0xb5/0xd0 ? syscall_trace_enter.isra.19+0x123/0x190 do_syscall_64+0x33/0x40 entry_SYSCALL_64_after_hwframe+0x44/0xa9 Ensure that cma_listen_on_all() atomically unwinds its action under the lock during error.
AI-Powered Analysis
Technical Analysis
CVE-2021-47392 is a vulnerability identified in the Linux kernel's RDMA (Remote Direct Memory Access) subsystem, specifically within the RDMA Connection Manager (rdma_cm) component. The issue arises in the function cma_listen_on_all(), which is responsible for setting up listeners on all devices for RDMA connections. When cma_listen_on_all() fails, it leaves per-device IDs on the listen_list without updating their state to RDMA_CM_ADDR_BOUND. This incorrect state prevents the proper invocation of cma_cancel_listens() during the destruction of the connection manager ID (cmid). As a result, the per-device IDs retain their reference counts and are not destroyed, leading to a deadlock scenario. The deadlock manifests as a blocked task waiting indefinitely, as shown in the provided kernel stack trace, which includes scheduling and destruction functions related to RDMA connection management. The root cause is a lack of atomic rollback or cleanup under the lock when cma_listen_on_all() encounters an error. This flaw can cause resource leaks and kernel deadlocks, potentially impacting system stability and availability. The vulnerability affects specific Linux kernel versions identified by commit hashes, and although no known exploits are reported in the wild, the issue is critical for environments utilizing RDMA for high-performance networking. The fix involves ensuring that cma_listen_on_all() properly unwinds its actions atomically under the lock during failure to prevent stale references and deadlocks.
Potential Impact
For European organizations, especially those operating data centers, HPC clusters, or financial trading platforms that rely on RDMA for low-latency, high-throughput networking, this vulnerability poses a significant risk to system availability and reliability. A deadlock in the kernel can cause service interruptions, requiring system reboots or manual intervention, which could lead to downtime and operational disruption. Organizations in sectors such as finance, research, telecommunications, and cloud service providers that deploy Linux servers with RDMA-enabled hardware are particularly vulnerable. The impact extends to any critical infrastructure relying on Linux kernels with affected versions, potentially affecting service-level agreements and causing financial and reputational damage. While the vulnerability does not directly expose confidentiality or integrity risks, the availability impact alone is substantial in environments where uptime and performance are critical.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions where this vulnerability is patched. Since the issue is related to specific commit versions, applying the latest stable kernel updates from trusted Linux distributions is essential. For environments where immediate patching is not feasible, administrators should consider disabling RDMA services or the rdma_cm module temporarily to mitigate the risk of deadlocks. Monitoring kernel logs for symptoms of deadlocks or resource leaks related to RDMA can help detect exploitation attempts or manifestation of the issue. Additionally, implementing robust kernel crash recovery and automated reboot mechanisms can reduce downtime impact. Organizations should also audit their RDMA usage and configurations to ensure minimal exposure. Engaging with hardware vendors for firmware and driver updates that complement kernel patches is advisable. Finally, thorough testing in staging environments before deploying patches in production will help avoid unintended disruptions.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-21T14:58:30.813Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9833c4522896dcbe8fb4
Added to database: 5/21/2025, 9:09:07 AM
Last enriched: 6/30/2025, 12:24:41 PM
Last updated: 8/2/2025, 12:55:37 AM
Views: 15
Related Threats
Researcher to release exploit for full auth bypass on FortiWeb
HighCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.