CVE-2021-47001

In the Linux kernel, the following vulnerability has been resolved: xprtrdma: Fix cwnd update ordering After a reconnect, the reply handler is opening the cwnd (and thus enabling more RPC Calls to be sent) /before/ rpcrdma_post_recvs() can post enough Receive WRs to receive their replies. This causes an RNR and the new connection is lost immediately. The race is most clearly exposed when KASAN and disconnect injection are enabled. This slows down rpcrdma_rep_create() enough to allow the send side to post a bunch of RPC Calls before the Receive completion handler can invoke ib_post_recv().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

11 Apr 2025, 22:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20250411-0001/ -

08 Jan 2025, 17:38

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.7
CWE NVD-CWE-noinfo
References () https://git.kernel.org/stable/c/19b5fa9489b5706bc878c3a522a7f771079e2fa0 - () https://git.kernel.org/stable/c/19b5fa9489b5706bc878c3a522a7f771079e2fa0 - Patch
References () https://git.kernel.org/stable/c/35d8b10a25884050bb3b0149b62c3818ec59f77c - () https://git.kernel.org/stable/c/35d8b10a25884050bb3b0149b62c3818ec59f77c - Patch
References () https://git.kernel.org/stable/c/8834ecb5df22b7ff3c9b0deba7726579bb613f95 - () https://git.kernel.org/stable/c/8834ecb5df22b7ff3c9b0deba7726579bb613f95 - Patch
References () https://git.kernel.org/stable/c/eddae8be7944096419c2ae29477a45f767d0fcd4 - () https://git.kernel.org/stable/c/eddae8be7944096419c2ae29477a45f767d0fcd4 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Linux linux Kernel

21 Nov 2024, 06:35

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: xprtrdma: corrige el orden de actualización de cwnd Después de una reconexión, el controlador de respuesta abre cwnd (y así permite que se envíen más llamadas RPC) /antes/ rpcrdma_post_recvs() puede publicar suficiente recepción WR para recibir sus respuestas. Esto provoca un RNR y la nueva conexión se pierde inmediatamente. La ejecución se expone más claramente cuando KASAN y la inyección de desconexión están habilitados. Esto ralentiza rpcrdma_rep_create() lo suficiente como para permitir que el lado de envío publique un montón de llamadas RPC antes de que el controlador de finalización de recepción pueda invocar ib_post_recv().
References () https://git.kernel.org/stable/c/19b5fa9489b5706bc878c3a522a7f771079e2fa0 - () https://git.kernel.org/stable/c/19b5fa9489b5706bc878c3a522a7f771079e2fa0 -
References () https://git.kernel.org/stable/c/35d8b10a25884050bb3b0149b62c3818ec59f77c - () https://git.kernel.org/stable/c/35d8b10a25884050bb3b0149b62c3818ec59f77c -
References () https://git.kernel.org/stable/c/8834ecb5df22b7ff3c9b0deba7726579bb613f95 - () https://git.kernel.org/stable/c/8834ecb5df22b7ff3c9b0deba7726579bb613f95 -
References () https://git.kernel.org/stable/c/eddae8be7944096419c2ae29477a45f767d0fcd4 - () https://git.kernel.org/stable/c/eddae8be7944096419c2ae29477a45f767d0fcd4 -

28 Feb 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-28 09:15

Updated : 2025-04-11 22:15


NVD link : CVE-2021-47001

Mitre link : CVE-2021-47001

CVE.ORG link : CVE-2021-47001


JSON object : View

Products Affected

linux

  • linux_kernel