CVE-2021-47132

Source
https://cve.org/CVERecord?id=CVE-2021-47132
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47132.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-47132
Downstream
Published
2024-03-15T21:15:07.690Z
Modified
2026-03-14T08:43:08.536409Z
Severity
  • 7.1 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix skforwardmemory corruption on retransmission

MPTCP skforwardmemory handling is a bit special, as such field is protected by the msk socket spin_lock, instead of the plain socket lock.

Currently we have a code path updating such field without handling the relevant lock:

__mptcp_retrans() -> _mptcpcleanunawakeup()

Several helpers in _mptcpcleanunawakeup() will update skforwardalloc, possibly causing such field corruption, as reported by Matthieu.

Address the issue providing and using a new variant of blamed function which explicitly acquires the msk spin lock.

References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47132.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "5.12"
            },
            {
                "fixed": "5.12.10"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "5.13-rc1"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "5.13-rc2"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "5.13-rc3"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "5.13-rc4"
            }
        ]
    }
]