Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2021-47593
HistoryJun 19, 2024 - 3:15 p.m.

CVE-2021-47593

2024-06-1915:15:53
Debian Security Bug Tracker
security-tracker.debian.org
5
linux kernel
vulnerability resolution
cve-2021-47593

AI Score

7

Confidence

High

EPSS

0

Percentile

15.5%

In the Linux kernel, the following vulnerability has been resolved: mptcp: clear ‘kern’ flag from fallback sockets The mptcp ULP extension relies on sk->sk_sock_kern being set correctly: It prevents setsockopt(fd, IPPROTO_TCP, TCP_ULP, “mptcp”, 6); from working for plain tcp sockets (any userspace-exposed socket). But in case of fallback, accept() can return a plain tcp sk. In such case, sk is still tagged as ‘kernel’ and setsockopt will work. This will crash the kernel, The subflow extension has a NULL ctx->conn mptcp socket: BUG: KASAN: null-ptr-deref in subflow_data_ready+0x181/0x2b0 Call Trace: tcp_data_ready+0xf8/0x370 […]

AI Score

7

Confidence

High

EPSS

0

Percentile

15.5%