
Cloud Vulnerability DB
A community-led vulnerabilities database
In the Linux kernel, a race condition vulnerability (CVE-2024-41041) was discovered in the UDP networking subsystem. The issue occurs in the udplibgetport() function where the SOCKRCU_FREE flag is set after the socket is added to the hash table, creating a potential race condition during socket lookup operations (Kernel Git).
The vulnerability exists in the UDP socket handling code where the SOCKRCUFREE flag is set too late in the execution flow. In udpv[46]earlydemux() and sklookup() functions, the code does not modify the refcount of the looked-up socket and uses sockpfree() as skb->destructor. The SOCKRCU_FREE check is performed too early in these functions, creating a race window between socket lookup and flag setting (Kernel Git).
This vulnerability can trigger kernel warnings and potentially lead to system instability. The issue was discovered when syzkaller triggered a warning in udpv4early_demux(), indicating potential memory safety issues in the UDP networking stack (RHSA-2024:10773).
The issue has been fixed by moving the SOCKRCUFREE flag setting earlier in the udplibget_port() function, before the socket is added to the hash table. This fix follows a similar pattern used to resolve a comparable issue in TCP networking code. Users should update to patched kernel versions that include this fix (RHSA-2024:10773).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."