SB2024062672 - Race condition in Linux kernel tipc
Published: June 26, 2024 Updated: May 13, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Race condition (CVE-ID: CVE-2021-47163)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a race condition within the cleanup_bearer() and tipc_udp_disable() functions in net/tipc/udp_media.c, within the tipc_exit_net() function in net/tipc/core.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/d1f76dfadaf8f47ed1753f97dbcbd41c16215ffa
- https://git.kernel.org/stable/c/5195ec5e365a2a9331bfeb585b613a6e94f98dba
- https://git.kernel.org/stable/c/b9f5b7ad4ac3af006443f535b1ce7bff1d130d7d
- https://git.kernel.org/stable/c/04c26faa51d1e2fe71cf13c45791f5174c37f986
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.42
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.9
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.124