CVE-2021-47152

Severity CVSS v4.0:
Pending analysis
Type:
CWE-787 Out-of-bounds Write
Publication date:
25/03/2024
Last modified:
13/03/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> mptcp: fix data stream corruption<br /> <br /> Maxim reported several issues when forcing a TCP transparent proxy<br /> to use the MPTCP protocol for the inbound connections. He also<br /> provided a clean reproducer.<br /> <br /> The problem boils down to &amp;#39;mptcp_frag_can_collapse_to()&amp;#39; assuming<br /> that only MPTCP will use the given page_frag.<br /> <br /> If others - e.g. the plain TCP protocol - allocate page fragments,<br /> we can end-up re-using already allocated memory for mptcp_data_frag.<br /> <br /> Fix the issue ensuring that the to-be-expanded data fragment is<br /> located at the current page frag end.<br /> <br /> v1 -&gt; v2:<br /> - added missing fixes tag (Mat)

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.7 (including) 5.10.42 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.12.9 (excluding)
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*