First published: Wed Feb 28 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: xprtrdma: Fix cwnd update ordering After a reconnect, the reply handler is opening the cwnd (and thus enabling more RPC Calls to be sent) /before/ rpcrdma_post_recvs() can post enough Receive WRs to receive their replies. This causes an RNR and the new connection is lost immediately. The race is most clearly exposed when KASAN and disconnect injection are enabled. This slows down rpcrdma_rep_create() enough to allow the send side to post a bunch of RPC Calls before the Receive completion handler can invoke ib_post_recv().
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=5.5<5.10.38 | |
Linux Kernel | >=5.11<5.11.22 | |
Linux Kernel | >=5.12<5.12.5 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.133-1 6.12.22-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-47001 is classified as a medium-severity vulnerability in the Linux kernel.
To fix CVE-2021-47001, upgrade to the patched versions of the Linux kernel: 5.10.223-1, 5.10.226-1, 6.1.123-1, 6.1.119-1, 6.12.10-1, or 6.12.11-1.
CVE-2021-47001 affects various versions of the Linux kernel, specifically those between 5.5 and 5.10.38, as well as other specified versions.
CVE-2021-47001 could potentially allow an attacker to exploit the vulnerability through unauthorized Remote Procedure Calls (RPC).
Details on CVE-2021-47001 can be found in several public repositories and security advisories regarding Linux kernel vulnerabilities.