CVE-2021-47152

In the Linux kernel, the following vulnerability has been resolved: mptcp: fix data stream corruption Maxim reported several issues when forcing a TCP transparent proxy to use the MPTCP protocol for the inbound connections. He also provided a clean reproducer. The problem boils down to 'mptcp_frag_can_collapse_to()' assuming that only MPTCP will use the given page_frag. If others - e.g. the plain TCP protocol - allocate page fragments, we can end-up re-using already allocated memory for mptcp_data_frag. Fix the issue ensuring that the to-be-expanded data fragment is located at the current page frag end. v1 -> v2: - added missing fixes tag (Mat)
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*

History

13 Mar 2025, 21:24

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-787
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/18e7f0580da15cac1e79d73683ada5a9e70980f8 - () https://git.kernel.org/stable/c/18e7f0580da15cac1e79d73683ada5a9e70980f8 - Patch
References () https://git.kernel.org/stable/c/29249eac5225429b898f278230a6ca2baa1ae154 - () https://git.kernel.org/stable/c/29249eac5225429b898f278230a6ca2baa1ae154 - Patch
References () https://git.kernel.org/stable/c/3267a061096efc91eda52c2a0c61ba76e46e4b34 - () https://git.kernel.org/stable/c/3267a061096efc91eda52c2a0c61ba76e46e4b34 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

21 Nov 2024, 06:35

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/18e7f0580da15cac1e79d73683ada5a9e70980f8 - () https://git.kernel.org/stable/c/18e7f0580da15cac1e79d73683ada5a9e70980f8 -
References () https://git.kernel.org/stable/c/29249eac5225429b898f278230a6ca2baa1ae154 - () https://git.kernel.org/stable/c/29249eac5225429b898f278230a6ca2baa1ae154 -
References () https://git.kernel.org/stable/c/3267a061096efc91eda52c2a0c61ba76e46e4b34 - () https://git.kernel.org/stable/c/3267a061096efc91eda52c2a0c61ba76e46e4b34 -

25 Mar 2024, 13:47

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: mptcp: corrige la corrupción del flujo de datos Maxim informó varios problemas al forzar a un proxy transparente TCP a utilizar el protocolo MPTCP para las conexiones entrantes. También proporcionó un reproductor limpio. El problema se reduce a 'mptcp_frag_can_collapse_to()' suponiendo que sólo MPTCP utilizará el page_frag dado. Si otros (por ejemplo, el protocolo TCP simple) asignan fragmentos de página, podemos terminar reutilizando la memoria ya asignada para mptcp_data_frag. Solucione el problema asegurándose de que el fragmento de datos que se va a expandir esté ubicado al final del fragmento de la página actual. v1 -> v2: - se agregó la etiqueta de correcciones faltantes (Mat)

25 Mar 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-25 09:15

Updated : 2025-03-13 21:24


NVD link : CVE-2021-47152

Mitre link : CVE-2021-47152

CVE.ORG link : CVE-2021-47152


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write