CVE-2021-47001: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: xprtrdma: Fix cwnd update ordering After a reconnect, the reply handler is opening the cwnd (and thus enabling more RPC Calls to be sent) /before/ rpcrdma_post_recvs() can post enough Receive WRs to receive their replies. This causes an RNR and the new connection is lost immediately. The race is most clearly exposed when KASAN and disconnect injection are enabled. This slows down rpcrdma_rep_create() enough to allow the send side to post a bunch of RPC Calls before the Receive completion handler can invoke ib_post_recv().
AI Analysis
Technical Summary
CVE-2021-47001 is a vulnerability identified in the Linux kernel specifically related to the xprtrdma module, which handles Remote Direct Memory Access (RDMA) transport for the RPC (Remote Procedure Call) subsystem. The issue arises from an improper ordering in the congestion window (cwnd) update during the reconnection phase of an RDMA connection. After a reconnect, the reply handler prematurely opens the congestion window, allowing more RPC calls to be sent before the rpcrdma_post_recvs() function can post a sufficient number of Receive Work Requests (WRs) to handle incoming replies. This race condition leads to a Receiver Not Ready (RNR) error, causing the new connection to be lost immediately. The vulnerability is particularly exposed when Kernel Address Sanitizer (KASAN) and disconnect injection are enabled, as these slow down the rpcrdma_rep_create() process, allowing the send side to post multiple RPC calls before the receive completion handler can post receive buffers. This flaw can cause connection instability and loss, potentially disrupting RPC-based communications over RDMA in affected Linux systems. While no known exploits are reported in the wild, the vulnerability affects core Linux kernel networking components and could impact systems relying on RDMA for high-performance networking.
Potential Impact
For European organizations, especially those operating in sectors relying on high-performance computing, data centers, cloud infrastructure, and scientific research, this vulnerability could disrupt critical RPC communications over RDMA. The immediate loss of connections due to the race condition may lead to service interruptions, degraded performance, and potential denial of service in environments where RDMA is heavily utilized. This could affect financial institutions, telecommunications providers, research institutions, and large enterprises using Linux-based servers with RDMA-enabled networking. The impact on confidentiality and integrity is limited as the vulnerability primarily causes connection loss rather than unauthorized access or data corruption. However, availability is significantly affected, which can have cascading effects on business operations and service level agreements.
Mitigation Recommendations
Organizations should prioritize applying the official Linux kernel patches that address the cwnd update ordering in the xprtrdma module as soon as they become available. Until patches are deployed, administrators should consider disabling RDMA transport for RPC where feasible, especially in non-critical environments, to prevent exploitation of the race condition. Monitoring kernel logs for RNR errors and connection drops related to RDMA RPC traffic can help detect attempts to trigger this issue. Additionally, testing updates in staging environments with KASAN and disconnect injection enabled can help validate the fix and ensure stability. Network segmentation and limiting RDMA usage to trusted internal networks can reduce exposure. Vendors and distributions should be engaged to ensure timely patch releases and guidance tailored to specific Linux versions in use.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Switzerland, Italy
CVE-2021-47001: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: xprtrdma: Fix cwnd update ordering After a reconnect, the reply handler is opening the cwnd (and thus enabling more RPC Calls to be sent) /before/ rpcrdma_post_recvs() can post enough Receive WRs to receive their replies. This causes an RNR and the new connection is lost immediately. The race is most clearly exposed when KASAN and disconnect injection are enabled. This slows down rpcrdma_rep_create() enough to allow the send side to post a bunch of RPC Calls before the Receive completion handler can invoke ib_post_recv().
AI-Powered Analysis
Technical Analysis
CVE-2021-47001 is a vulnerability identified in the Linux kernel specifically related to the xprtrdma module, which handles Remote Direct Memory Access (RDMA) transport for the RPC (Remote Procedure Call) subsystem. The issue arises from an improper ordering in the congestion window (cwnd) update during the reconnection phase of an RDMA connection. After a reconnect, the reply handler prematurely opens the congestion window, allowing more RPC calls to be sent before the rpcrdma_post_recvs() function can post a sufficient number of Receive Work Requests (WRs) to handle incoming replies. This race condition leads to a Receiver Not Ready (RNR) error, causing the new connection to be lost immediately. The vulnerability is particularly exposed when Kernel Address Sanitizer (KASAN) and disconnect injection are enabled, as these slow down the rpcrdma_rep_create() process, allowing the send side to post multiple RPC calls before the receive completion handler can post receive buffers. This flaw can cause connection instability and loss, potentially disrupting RPC-based communications over RDMA in affected Linux systems. While no known exploits are reported in the wild, the vulnerability affects core Linux kernel networking components and could impact systems relying on RDMA for high-performance networking.
Potential Impact
For European organizations, especially those operating in sectors relying on high-performance computing, data centers, cloud infrastructure, and scientific research, this vulnerability could disrupt critical RPC communications over RDMA. The immediate loss of connections due to the race condition may lead to service interruptions, degraded performance, and potential denial of service in environments where RDMA is heavily utilized. This could affect financial institutions, telecommunications providers, research institutions, and large enterprises using Linux-based servers with RDMA-enabled networking. The impact on confidentiality and integrity is limited as the vulnerability primarily causes connection loss rather than unauthorized access or data corruption. However, availability is significantly affected, which can have cascading effects on business operations and service level agreements.
Mitigation Recommendations
Organizations should prioritize applying the official Linux kernel patches that address the cwnd update ordering in the xprtrdma module as soon as they become available. Until patches are deployed, administrators should consider disabling RDMA transport for RPC where feasible, especially in non-critical environments, to prevent exploitation of the race condition. Monitoring kernel logs for RNR errors and connection drops related to RDMA RPC traffic can help detect attempts to trigger this issue. Additionally, testing updates in staging environments with KASAN and disconnect injection enabled can help validate the fix and ensure stability. Network segmentation and limiting RDMA usage to trusted internal networks can reduce exposure. Vendors and distributions should be engaged to ensure timely patch releases and guidance tailored to specific Linux versions in use.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-27T18:42:55.950Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9821c4522896dcbddff1
Added to database: 5/21/2025, 9:08:49 AM
Last enriched: 6/28/2025, 4:41:33 AM
Last updated: 8/16/2025, 4:07:01 AM
Views: 12
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.