Executive Summary

Informations
Name CVE-2021-47152 First vendor Publication 2024-03-25
Vendor Cve Last vendor Modification 2024-03-25

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix data stream corruption

Maxim reported several issues when forcing a TCP transparent proxy to use the MPTCP protocol for the inbound connections. He also provided a clean reproducer.

The problem boils down to 'mptcp_frag_can_collapse_to()' assuming that only MPTCP will use the given page_frag.

If others - e.g. the plain TCP protocol - allocate page fragments, we can end-up re-using already allocated memory for mptcp_data_frag.

Fix the issue ensuring that the to-be-expanded data fragment is located at the current page frag end.

v1 -> v2:
- added missing fixes tag (Mat)

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47152

Sources (Detail)

https://git.kernel.org/stable/c/18e7f0580da15cac1e79d73683ada5a9e70980f8
https://git.kernel.org/stable/c/29249eac5225429b898f278230a6ca2baa1ae154
https://git.kernel.org/stable/c/3267a061096efc91eda52c2a0c61ba76e46e4b34
Source Url

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2024-03-25 17:27:25
  • First insertion