CVE-2021-47593

Severity CVSS v4.0:
Pending analysis
Type:
CWE-476 NULL Pointer Dereference
Publication date:
19/06/2024
Last modified:
01/11/2024

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> mptcp: clear &amp;#39;kern&amp;#39; flag from fallback sockets<br /> <br /> The mptcp ULP extension relies on sk-&gt;sk_sock_kern being set correctly:<br /> It prevents setsockopt(fd, IPPROTO_TCP, TCP_ULP, "mptcp", 6); from<br /> working for plain tcp sockets (any userspace-exposed socket).<br /> <br /> But in case of fallback, accept() can return a plain tcp sk.<br /> In such case, sk is still tagged as &amp;#39;kernel&amp;#39; and setsockopt will work.<br /> <br /> This will crash the kernel, The subflow extension has a NULL ctx-&gt;conn<br /> mptcp socket:<br /> <br /> BUG: KASAN: null-ptr-deref in subflow_data_ready+0x181/0x2b0<br /> Call Trace:<br /> tcp_data_ready+0xf8/0x370<br /> [..]

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.6 (including) 5.10.88 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.11 (excluding)
cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc5:*:*:*:*:*:*