Lucene search

K
redhatcveRedhat.comRH:CVE-2021-47593
HistoryJun 20, 2024 - 10:53 a.m.

CVE-2021-47593

2024-06-2010:53:30
redhat.com
access.redhat.com
3
linux kernel
mptcp
fallback sockets
vulnerability
null ctx->conn
tcp sk

7.2 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.8%

In the Linux kernel, the following vulnerability has been resolved: mptcp: clear ‘kern’ flag from fallback sockets The mptcp ULP extension relies on sk->sk_sock_kern being set correctly: It prevents setsockopt(fd, IPPROTO_TCP, TCP_ULP, “mptcp”, 6); from working for plain tcp sockets (any userspace-exposed socket). But in case of fallback, accept() can return a plain tcp sk. In such case, sk is still tagged as ‘kernel’ and setsockopt will work. This will crash the kernel, The subflow extension has a NULL ctx->conn mptcp socket: BUG: KASAN: null-ptr-deref in subflow_data_ready+0x181/0x2b0 Call Trace: tcp_data_ready+0xf8/0x370 […]

7.2 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.8%

Related for RH:CVE-2021-47593