In the Linux kernel, the following vulnerability has been resolved:
mptcp: fix skforwardmemory corruption on retransmission
MPTCP skforwardmemory handling is a bit special, as such field is protected by the msk socket spin_lock, instead of the plain socket lock.
Currently we have a code path updating such field without handling the relevant lock:
__mptcp_retrans() -> _mptcpcleanunawakeup()
Several helpers in _mptcpcleanunawakeup() will update skforwardalloc, possibly causing such field corruption, as reported by Matthieu.
Address the issue providing and using a new variant of blamed function which explicitly acquires the msk spin lock.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47132.json"
[
{
"events": [
{
"introduced": "5.12"
},
{
"fixed": "5.12.10"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.13-rc1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.13-rc2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.13-rc3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.13-rc4"
}
]
}
]