28 lines
1.4 KiB
JSON
Raw Normal View History

{
"id": "CVE-2021-47152",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-25T09:15:09.357",
"lastModified": "2024-03-25T09:15:09.357",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: fix data stream corruption\n\nMaxim reported several issues when forcing a TCP transparent proxy\nto use the MPTCP protocol for the inbound connections. He also\nprovided a clean reproducer.\n\nThe problem boils down to 'mptcp_frag_can_collapse_to()' assuming\nthat only MPTCP will use the given page_frag.\n\nIf others - e.g. the plain TCP protocol - allocate page fragments,\nwe can end-up re-using already allocated memory for mptcp_data_frag.\n\nFix the issue ensuring that the to-be-expanded data fragment is\nlocated at the current page frag end.\n\nv1 -> v2:\n - added missing fixes tag (Mat)"
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/18e7f0580da15cac1e79d73683ada5a9e70980f8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/29249eac5225429b898f278230a6ca2baa1ae154",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/3267a061096efc91eda52c2a0c61ba76e46e4b34",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}