CVE-2021-47132
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
15/03/2024
Last modified:
13/03/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
mptcp: fix sk_forward_memory corruption on retransmission<br />
<br />
MPTCP sk_forward_memory handling is a bit special, as such field<br />
is protected by the msk socket spin_lock, instead of the plain<br />
socket lock.<br />
<br />
Currently we have a code path updating such field without handling<br />
the relevant lock:<br />
<br />
__mptcp_retrans() -> __mptcp_clean_una_wakeup()<br />
<br />
Several helpers in __mptcp_clean_una_wakeup() will update<br />
sk_forward_alloc, possibly causing such field corruption, as reported<br />
by Matthieu.<br />
<br />
Address the issue providing and using a new variant of blamed function<br />
which explicitly acquires the msk spin lock.
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.12 (including) | 5.12.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



