Skip to main content

CVE-2021-47001: Vulnerability in Linux Linux

High
VulnerabilityCVE-2021-47001cvecve-2021-47001
Published: Wed Feb 28 2024 (02/28/2024, 08:13:23 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: xprtrdma: Fix cwnd update ordering After a reconnect, the reply handler is opening the cwnd (and thus enabling more RPC Calls to be sent) /before/ rpcrdma_post_recvs() can post enough Receive WRs to receive their replies. This causes an RNR and the new connection is lost immediately. The race is most clearly exposed when KASAN and disconnect injection are enabled. This slows down rpcrdma_rep_create() enough to allow the send side to post a bunch of RPC Calls before the Receive completion handler can invoke ib_post_recv().

AI-Powered Analysis

AILast updated: 06/28/2025, 04:41:33 UTC

Technical Analysis

CVE-2021-47001 is a vulnerability identified in the Linux kernel specifically related to the xprtrdma module, which handles Remote Direct Memory Access (RDMA) transport for the RPC (Remote Procedure Call) subsystem. The issue arises from an improper ordering in the congestion window (cwnd) update during the reconnection phase of an RDMA connection. After a reconnect, the reply handler prematurely opens the congestion window, allowing more RPC calls to be sent before the rpcrdma_post_recvs() function can post a sufficient number of Receive Work Requests (WRs) to handle incoming replies. This race condition leads to a Receiver Not Ready (RNR) error, causing the new connection to be lost immediately. The vulnerability is particularly exposed when Kernel Address Sanitizer (KASAN) and disconnect injection are enabled, as these slow down the rpcrdma_rep_create() process, allowing the send side to post multiple RPC calls before the receive completion handler can post receive buffers. This flaw can cause connection instability and loss, potentially disrupting RPC-based communications over RDMA in affected Linux systems. While no known exploits are reported in the wild, the vulnerability affects core Linux kernel networking components and could impact systems relying on RDMA for high-performance networking.

Potential Impact

For European organizations, especially those operating in sectors relying on high-performance computing, data centers, cloud infrastructure, and scientific research, this vulnerability could disrupt critical RPC communications over RDMA. The immediate loss of connections due to the race condition may lead to service interruptions, degraded performance, and potential denial of service in environments where RDMA is heavily utilized. This could affect financial institutions, telecommunications providers, research institutions, and large enterprises using Linux-based servers with RDMA-enabled networking. The impact on confidentiality and integrity is limited as the vulnerability primarily causes connection loss rather than unauthorized access or data corruption. However, availability is significantly affected, which can have cascading effects on business operations and service level agreements.

Mitigation Recommendations

Organizations should prioritize applying the official Linux kernel patches that address the cwnd update ordering in the xprtrdma module as soon as they become available. Until patches are deployed, administrators should consider disabling RDMA transport for RPC where feasible, especially in non-critical environments, to prevent exploitation of the race condition. Monitoring kernel logs for RNR errors and connection drops related to RDMA RPC traffic can help detect attempts to trigger this issue. Additionally, testing updates in staging environments with KASAN and disconnect injection enabled can help validate the fix and ensure stability. Network segmentation and limiting RDMA usage to trusted internal networks can reduce exposure. Vendors and distributions should be engaged to ensure timely patch releases and guidance tailored to specific Linux versions in use.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-27T18:42:55.950Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9821c4522896dcbddff1

Added to database: 5/21/2025, 9:08:49 AM

Last enriched: 6/28/2025, 4:41:33 AM

Last updated: 8/16/2025, 4:07:01 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats