In the Linux kernel, the following vulnerability has been resolved: udp: fix race between close() and udp_abort() Kaustubh reported and diagnosed a panic in udp_lib_lookup(). The root cause is udp_abort() racing with close(). Both racing functions acquire the socket lock, but udp{v6}_destroy_sock() release it before performing destructive actions. We can't easily extend the socket lock scope to avoid the race, instead use the SOCK_DEAD flag to prevent udp_abort from doing any action when the critical race happens. Diagnosed-and-tested-by: Kaustubh Pandey <[email protected]>
History

Mon, 04 Nov 2024 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-05-21T14:19:45.588Z

Updated: 2024-12-19T07:38:11.720Z

Reserved: 2024-04-10T18:59:19.536Z

Link: CVE-2021-47248

cve-icon Vulnrichment

Updated: 2024-08-04T05:32:07.937Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-21T15:15:13.780

Modified: 2024-11-21T06:35:43.190

Link: CVE-2021-47248

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-05-21T00:00:00Z

Links: CVE-2021-47248 - Bugzilla