In the Linux kernel, the following vulnerability has been resolved: mptcp: fix data stream corruption Maxim reported several issues when forcing a TCP transparent proxy to use the MPTCP protocol for the inbound connections. He also provided a clean reproducer. The problem boils down to 'mptcp_frag_can_collapse_to()' assuming that only MPTCP will use the given page_frag. If others - e.g. the plain TCP protocol - allocate page fragments, we can end-up re-using already allocated memory for mptcp_data_frag. Fix the issue ensuring that the to-be-expanded data fragment is located at the current page frag end. v1 -> v2: - added missing fixes tag (Mat)
History

Wed, 11 Sep 2024 18:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Sep 2024 13:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-03-25T09:07:47.235Z

Updated: 2024-11-04T12:00:29.864Z

Reserved: 2024-03-04T18:12:48.846Z

Link: CVE-2021-47152

cve-icon Vulnrichment

Updated: 2024-08-04T05:24:39.850Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-03-25T09:15:09.357

Modified: 2024-03-25T13:47:14.087

Link: CVE-2021-47152

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-03-25T00:00:00Z

Links: CVE-2021-47152 - Bugzilla