CVE-2021-47392
📋 TL;DR
This vulnerability in the Linux kernel's RDMA/CMA subsystem causes a resource leak and potential deadlock when rdma_cma_listen_on_all() fails. It affects systems using RDMA (Remote Direct Memory Access) functionality, particularly in high-performance computing and data center environments. The issue prevents proper cleanup of connection IDs, leading to resource exhaustion.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
System deadlock requiring reboot, denial of service for RDMA services, and potential resource exhaustion affecting other system functions.
Likely Case
RDMA service degradation or failure, connection timeouts, and reduced system performance due to resource leaks.
If Mitigated
Minimal impact if RDMA is not used or if affected systems are isolated from untrusted networks.
🎯 Exploit Status
Exploitation requires triggering specific failure conditions in RDMA connection setup, making it difficult to weaponize.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Patches available in stable kernel branches (commits: 3f4e68902d2e545033c80d7ad62fd9a439e573f4, ca465e1f1f9b38fe916a36f7d80c5d25f2337c81, e56a5146ef8cb51cd7c9e748267dce7564448a35)
Vendor Advisory: https://git.kernel.org/stable/c/3f4e68902d2e545033c80d7ad62fd9a439e573f4
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix. 2. Check with your distribution for backported patches. 3. Reboot system after kernel update.
🔧 Temporary Workarounds
Disable RDMA
linuxDisable RDMA functionality if not required
modprobe -r rdma_cm
echo 'blacklist rdma_cm' >> /etc/modprobe.d/blacklist.conf
🧯 If You Can't Patch
- Restrict RDMA usage to trusted internal networks only
- Monitor system for RDMA connection failures and restart services if degradation occurs
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if RDMA modules are loaded: lsmod | grep rdma_cm
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is updated and check dmesg for RDMA errors after update
📡 Detection & Monitoring
Log Indicators:
- Kernel logs showing RDMA connection failures
- System logs with process deadlocks involving RDMA services
Network Indicators:
- RDMA connection timeouts
- Increased latency in RDMA communications
SIEM Query:
Process:name=rping AND State:Deadlock OR LogSource:kernel AND Message:*RDMA* AND (Error OR Fail*)
🔗 References
- https://git.kernel.org/stable/c/3f4e68902d2e545033c80d7ad62fd9a439e573f4
- https://git.kernel.org/stable/c/ca465e1f1f9b38fe916a36f7d80c5d25f2337c81
- https://git.kernel.org/stable/c/e56a5146ef8cb51cd7c9e748267dce7564448a35
- https://git.kernel.org/stable/c/3f4e68902d2e545033c80d7ad62fd9a439e573f4
- https://git.kernel.org/stable/c/ca465e1f1f9b38fe916a36f7d80c5d25f2337c81
- https://git.kernel.org/stable/c/e56a5146ef8cb51cd7c9e748267dce7564448a35