CVE-2021-47152
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
25/03/2024
Last modified:
13/03/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
mptcp: fix data stream corruption<br />
<br />
Maxim reported several issues when forcing a TCP transparent proxy<br />
to use the MPTCP protocol for the inbound connections. He also<br />
provided a clean reproducer.<br />
<br />
The problem boils down to &#39;mptcp_frag_can_collapse_to()&#39; assuming<br />
that only MPTCP will use the given page_frag.<br />
<br />
If others - e.g. the plain TCP protocol - allocate page fragments,<br />
we can end-up re-using already allocated memory for mptcp_data_frag.<br />
<br />
Fix the issue ensuring that the to-be-expanded data fragment is<br />
located at the current page frag end.<br />
<br />
v1 -> v2:<br />
- added missing fixes tag (Mat)
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.7 (including) | 5.10.42 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.12.9 (excluding) |
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/18e7f0580da15cac1e79d73683ada5a9e70980f8
- https://git.kernel.org/stable/c/29249eac5225429b898f278230a6ca2baa1ae154
- https://git.kernel.org/stable/c/3267a061096efc91eda52c2a0c61ba76e46e4b34
- https://git.kernel.org/stable/c/18e7f0580da15cac1e79d73683ada5a9e70980f8
- https://git.kernel.org/stable/c/29249eac5225429b898f278230a6ca2baa1ae154
- https://git.kernel.org/stable/c/3267a061096efc91eda52c2a0c61ba76e46e4b34