CVE-2021-47001
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
28/02/2024
Last modified:
11/04/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
xprtrdma: Fix cwnd update ordering<br />
<br />
After a reconnect, the reply handler is opening the cwnd (and thus<br />
enabling more RPC Calls to be sent) /before/ rpcrdma_post_recvs()<br />
can post enough Receive WRs to receive their replies. This causes an<br />
RNR and the new connection is lost immediately.<br />
<br />
The race is most clearly exposed when KASAN and disconnect injection<br />
are enabled. This slows down rpcrdma_rep_create() enough to allow<br />
the send side to post a bunch of RPC Calls before the Receive<br />
completion handler can invoke ib_post_recv().
Impact
Base Score 3.x
4.70
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.38 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.11.22 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.12 (including) | 5.12.5 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/19b5fa9489b5706bc878c3a522a7f771079e2fa0
- https://git.kernel.org/stable/c/35d8b10a25884050bb3b0149b62c3818ec59f77c
- https://git.kernel.org/stable/c/8834ecb5df22b7ff3c9b0deba7726579bb613f95
- https://git.kernel.org/stable/c/eddae8be7944096419c2ae29477a45f767d0fcd4
- https://git.kernel.org/stable/c/19b5fa9489b5706bc878c3a522a7f771079e2fa0
- https://git.kernel.org/stable/c/35d8b10a25884050bb3b0149b62c3818ec59f77c
- https://git.kernel.org/stable/c/8834ecb5df22b7ff3c9b0deba7726579bb613f95
- https://git.kernel.org/stable/c/eddae8be7944096419c2ae29477a45f767d0fcd4
- https://security.netapp.com/advisory/ntap-20250411-0001/



