Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2021-47001
HistoryFeb 28, 2024 - 9:15 a.m.

CVE-2021-47001

2024-02-2809:15:38
Debian Security Bug Tracker
security-tracker.debian.org
3
linux kernel
xprtrdma
vulnerability fix
cwnd update
reconnect
rpc calls
rnr
kasan
disconnect injection
ib_post_recv

6.9 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.7%

In the Linux kernel, the following vulnerability has been resolved: xprtrdma: Fix cwnd update ordering After a reconnect, the reply handler is opening the cwnd (and thus enabling more RPC Calls to be sent) /before/ rpcrdma_post_recvs() can post enough Receive WRs to receive their replies. This causes an RNR and the new connection is lost immediately. The race is most clearly exposed when KASAN and disconnect injection are enabled. This slows down rpcrdma_rep_create() enough to allow the send side to post a bunch of RPC Calls before the Receive completion handler can invoke ib_post_recv().

6.9 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.7%