CVE-2021-47024 (GCVE-0-2021-47024)
Vulnerability from cvelistv5
Published
2024-02-28 08:13
Modified
2024-12-19 07:33
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: free queued packets when closing socket As reported by syzbot [1], there is a memory leak while closing the socket. We partially solved this issue with commit ac03046ece2b ("vsock/virtio: free packets during the socket release"), but we forgot to drain the RX queue when the socket is definitely closed by the scheduled work. To avoid future issues, let's use the new virtio_transport_remove_sock() to drain the RX queue before removing the socket from the af_vsock lists calling vsock_remove_sock(). [1] https://syzkaller.appspot.com/bug?extid=24452624fc4c571eedd9
Impacted products
Vendor Product Version
Linux Linux Version: ac03046ece2b158ebd204dfc4896fd9f39f0e6c8
Version: ac03046ece2b158ebd204dfc4896fd9f39f0e6c8
Version: ac03046ece2b158ebd204dfc4896fd9f39f0e6c8
Version: ac03046ece2b158ebd204dfc4896fd9f39f0e6c8
Create a notification for this product.
   Linux Linux Version: 5.2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2021-47024",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-03-05T18:00:51.887353Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-04T17:13:23.950Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T05:24:39.600Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/b605673b523fe33abeafb2136759bcbc9c1e6ebf",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/27691665145e74a45034a9dccf1150cf1894763a",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/37c38674ef2f8d7e8629e5d433c37d6c1273d16b",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/8432b8114957235f42e070a16118a7f750de9d39",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Linux",
               programFiles: [
                  "net/vmw_vsock/virtio_transport_common.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     lessThan: "b605673b523fe33abeafb2136759bcbc9c1e6ebf",
                     status: "affected",
                     version: "ac03046ece2b158ebd204dfc4896fd9f39f0e6c8",
                     versionType: "git",
                  },
                  {
                     lessThan: "27691665145e74a45034a9dccf1150cf1894763a",
                     status: "affected",
                     version: "ac03046ece2b158ebd204dfc4896fd9f39f0e6c8",
                     versionType: "git",
                  },
                  {
                     lessThan: "37c38674ef2f8d7e8629e5d433c37d6c1273d16b",
                     status: "affected",
                     version: "ac03046ece2b158ebd204dfc4896fd9f39f0e6c8",
                     versionType: "git",
                  },
                  {
                     lessThan: "8432b8114957235f42e070a16118a7f750de9d39",
                     status: "affected",
                     version: "ac03046ece2b158ebd204dfc4896fd9f39f0e6c8",
                     versionType: "git",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "Linux",
               programFiles: [
                  "net/vmw_vsock/virtio_transport_common.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     status: "affected",
                     version: "5.2",
                  },
                  {
                     lessThan: "5.2",
                     status: "unaffected",
                     version: "0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.10.*",
                     status: "unaffected",
                     version: "5.10.37",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.11.*",
                     status: "unaffected",
                     version: "5.11.21",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.12.*",
                     status: "unaffected",
                     version: "5.12.4",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "*",
                     status: "unaffected",
                     version: "5.13",
                     versionType: "original_commit_for_fix",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock/virtio: free queued packets when closing socket\n\nAs reported by syzbot [1], there is a memory leak while closing the\nsocket. We partially solved this issue with commit ac03046ece2b\n(\"vsock/virtio: free packets during the socket release\"), but we\nforgot to drain the RX queue when the socket is definitely closed by\nthe scheduled work.\n\nTo avoid future issues, let's use the new virtio_transport_remove_sock()\nto drain the RX queue before removing the socket from the af_vsock lists\ncalling vsock_remove_sock().\n\n[1] https://syzkaller.appspot.com/bug?extid=24452624fc4c571eedd9",
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-12-19T07:33:48.472Z",
            orgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
            shortName: "Linux",
         },
         references: [
            {
               url: "https://git.kernel.org/stable/c/b605673b523fe33abeafb2136759bcbc9c1e6ebf",
            },
            {
               url: "https://git.kernel.org/stable/c/27691665145e74a45034a9dccf1150cf1894763a",
            },
            {
               url: "https://git.kernel.org/stable/c/37c38674ef2f8d7e8629e5d433c37d6c1273d16b",
            },
            {
               url: "https://git.kernel.org/stable/c/8432b8114957235f42e070a16118a7f750de9d39",
            },
         ],
         title: "vsock/virtio: free queued packets when closing socket",
         x_generator: {
            engine: "bippy-5f407fcff5a0",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      assignerShortName: "Linux",
      cveId: "CVE-2021-47024",
      datePublished: "2024-02-28T08:13:36.489Z",
      dateReserved: "2024-02-27T18:42:55.960Z",
      dateUpdated: "2024-12-19T07:33:48.472Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      fkie_nvd: {
         configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.2\", \"versionEndExcluding\": \"5.10.37\", \"matchCriteriaId\": \"CAD59DAB-9845-41C5-9D7A-EB9C40A85BE5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.11\", \"versionEndExcluding\": \"5.11.21\", \"matchCriteriaId\": \"8CBB94EC-EC33-4464-99C5-03E5542715F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.12\", \"versionEndExcluding\": \"5.12.4\", \"matchCriteriaId\": \"D8C7052F-1B7B-4327-9C2B-84EBF3243838\"}]}]}]",
         descriptions: "[{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nvsock/virtio: free queued packets when closing socket\\n\\nAs reported by syzbot [1], there is a memory leak while closing the\\nsocket. We partially solved this issue with commit ac03046ece2b\\n(\\\"vsock/virtio: free packets during the socket release\\\"), but we\\nforgot to drain the RX queue when the socket is definitely closed by\\nthe scheduled work.\\n\\nTo avoid future issues, let's use the new virtio_transport_remove_sock()\\nto drain the RX queue before removing the socket from the af_vsock lists\\ncalling vsock_remove_sock().\\n\\n[1] https://syzkaller.appspot.com/bug?extid=24452624fc4c571eedd9\"}, {\"lang\": \"es\", \"value\": \"En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: vsock/virtio: paquetes libres en cola al cerrar el socket Seg\\u00fan lo informado por syzbot [1], hay una p\\u00e9rdida de memoria al cerrar el socket. Resolvimos parcialmente este problema con el compromiso ac03046ece2b (\\\"vsock/virtio: paquetes libres durante el lanzamiento del socket\\\"), pero nos olvidamos de vaciar la cola RX cuando el trabajo programado cierra definitivamente el socket. Para evitar problemas futuros, usemos el nuevo virtio_transport_remove_sock() para drenar la cola RX antes de eliminar el socket de las listas af_vsock llamando a vsock_remove_sock(). [1] https://syzkaller.appspot.com/bug?extid=24452624fc4c571eedd9\"}]",
         id: "CVE-2021-47024",
         lastModified: "2024-12-06T20:53:23.077",
         metrics: "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}]}",
         published: "2024-02-28T09:15:39.243",
         references: "[{\"url\": \"https://git.kernel.org/stable/c/27691665145e74a45034a9dccf1150cf1894763a\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/37c38674ef2f8d7e8629e5d433c37d6c1273d16b\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/8432b8114957235f42e070a16118a7f750de9d39\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/b605673b523fe33abeafb2136759bcbc9c1e6ebf\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/27691665145e74a45034a9dccf1150cf1894763a\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/37c38674ef2f8d7e8629e5d433c37d6c1273d16b\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/8432b8114957235f42e070a16118a7f750de9d39\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/b605673b523fe33abeafb2136759bcbc9c1e6ebf\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}]",
         sourceIdentifier: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
         vulnStatus: "Analyzed",
         weaknesses: "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-401\"}]}]",
      },
      nvd: "{\"cve\":{\"id\":\"CVE-2021-47024\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-02-28T09:15:39.243\",\"lastModified\":\"2024-12-06T20:53:23.077\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nvsock/virtio: free queued packets when closing socket\\n\\nAs reported by syzbot [1], there is a memory leak while closing the\\nsocket. We partially solved this issue with commit ac03046ece2b\\n(\\\"vsock/virtio: free packets during the socket release\\\"), but we\\nforgot to drain the RX queue when the socket is definitely closed by\\nthe scheduled work.\\n\\nTo avoid future issues, let's use the new virtio_transport_remove_sock()\\nto drain the RX queue before removing the socket from the af_vsock lists\\ncalling vsock_remove_sock().\\n\\n[1] https://syzkaller.appspot.com/bug?extid=24452624fc4c571eedd9\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: vsock/virtio: paquetes libres en cola al cerrar el socket Según lo informado por syzbot [1], hay una pérdida de memoria al cerrar el socket. Resolvimos parcialmente este problema con el compromiso ac03046ece2b (\\\"vsock/virtio: paquetes libres durante el lanzamiento del socket\\\"), pero nos olvidamos de vaciar la cola RX cuando el trabajo programado cierra definitivamente el socket. Para evitar problemas futuros, usemos el nuevo virtio_transport_remove_sock() para drenar la cola RX antes de eliminar el socket de las listas af_vsock llamando a vsock_remove_sock(). [1] https://syzkaller.appspot.com/bug?extid=24452624fc4c571eedd9\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-401\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.2\",\"versionEndExcluding\":\"5.10.37\",\"matchCriteriaId\":\"CAD59DAB-9845-41C5-9D7A-EB9C40A85BE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.11.21\",\"matchCriteriaId\":\"8CBB94EC-EC33-4464-99C5-03E5542715F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.12\",\"versionEndExcluding\":\"5.12.4\",\"matchCriteriaId\":\"D8C7052F-1B7B-4327-9C2B-84EBF3243838\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/27691665145e74a45034a9dccf1150cf1894763a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/37c38674ef2f8d7e8629e5d433c37d6c1273d16b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/8432b8114957235f42e070a16118a7f750de9d39\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/b605673b523fe33abeafb2136759bcbc9c1e6ebf\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/27691665145e74a45034a9dccf1150cf1894763a\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/37c38674ef2f8d7e8629e5d433c37d6c1273d16b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/8432b8114957235f42e070a16118a7f750de9d39\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/b605673b523fe33abeafb2136759bcbc9c1e6ebf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}",
      vulnrichment: {
         containers: "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/b605673b523fe33abeafb2136759bcbc9c1e6ebf\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/27691665145e74a45034a9dccf1150cf1894763a\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/37c38674ef2f8d7e8629e5d433c37d6c1273d16b\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/8432b8114957235f42e070a16118a7f750de9d39\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T05:24:39.600Z\"}}, {\"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-47024\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-03-05T18:00:51.887353Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-05-23T19:01:15.506Z\"}, \"title\": \"CISA ADP Vulnrichment\"}], \"cna\": {\"title\": \"vsock/virtio: free queued packets when closing socket\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"ac03046ece2b158ebd204dfc4896fd9f39f0e6c8\", \"lessThan\": \"b605673b523fe33abeafb2136759bcbc9c1e6ebf\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"ac03046ece2b158ebd204dfc4896fd9f39f0e6c8\", \"lessThan\": \"27691665145e74a45034a9dccf1150cf1894763a\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"ac03046ece2b158ebd204dfc4896fd9f39f0e6c8\", \"lessThan\": \"37c38674ef2f8d7e8629e5d433c37d6c1273d16b\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"ac03046ece2b158ebd204dfc4896fd9f39f0e6c8\", \"lessThan\": \"8432b8114957235f42e070a16118a7f750de9d39\", \"versionType\": \"git\"}], \"programFiles\": [\"net/vmw_vsock/virtio_transport_common.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.2\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"5.2\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.10.37\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.11.21\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.11.*\"}, {\"status\": \"unaffected\", \"version\": \"5.12.4\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.12.*\"}, {\"status\": \"unaffected\", \"version\": \"5.13\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"net/vmw_vsock/virtio_transport_common.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/b605673b523fe33abeafb2136759bcbc9c1e6ebf\"}, {\"url\": \"https://git.kernel.org/stable/c/27691665145e74a45034a9dccf1150cf1894763a\"}, {\"url\": \"https://git.kernel.org/stable/c/37c38674ef2f8d7e8629e5d433c37d6c1273d16b\"}, {\"url\": \"https://git.kernel.org/stable/c/8432b8114957235f42e070a16118a7f750de9d39\"}], \"x_generator\": {\"engine\": \"bippy-5f407fcff5a0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nvsock/virtio: free queued packets when closing socket\\n\\nAs reported by syzbot [1], there is a memory leak while closing the\\nsocket. We partially solved this issue with commit ac03046ece2b\\n(\\\"vsock/virtio: free packets during the socket release\\\"), but we\\nforgot to drain the RX queue when the socket is definitely closed by\\nthe scheduled work.\\n\\nTo avoid future issues, let's use the new virtio_transport_remove_sock()\\nto drain the RX queue before removing the socket from the af_vsock lists\\ncalling vsock_remove_sock().\\n\\n[1] https://syzkaller.appspot.com/bug?extid=24452624fc4c571eedd9\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-12-19T07:33:48.472Z\"}}}",
         cveMetadata: "{\"cveId\": \"CVE-2021-47024\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-19T07:33:48.472Z\", \"dateReserved\": \"2024-02-27T18:42:55.960Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-02-28T08:13:36.489Z\", \"assignerShortName\": \"Linux\"}",
         dataType: "CVE_RECORD",
         dataVersion: "5.1",
      },
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.