CVE-2021-47591

Source
https://cve.org/CVERecord?id=CVE-2021-47591
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47591.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-47591
Downstream
Related
Published
2024-06-19T15:15:53.700Z
Modified
2026-03-10T23:51:41.733069Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

mptcp: remove tcp ulp setsockopt support

TCP_ULP setsockopt cannot be used for mptcp because its already used internally to plumb subflow (tcp) sockets to the mptcp layer.

syzbot managed to trigger a crash for mptcp connections that are in fallback mode:

KASAN: null-ptr-deref in range [0x0000000000000020-0x0000000000000027] CPU: 1 PID: 1083 Comm: syz-executor.3 Not tainted 5.16.0-rc2-syzkaller #0 RIP: 0010:tlsbuildproto net/tls/tls_main.c:776 [inline] [..] _tcpsetulp net/ipv4/tcpulp.c:139 [inline] tcpsetulp+0x428/0x4c0 net/ipv4/tcpulp.c:160 dotcpsetsockopt+0x455/0x37c0 net/ipv4/tcp.c:3391 mptcpsetsockopt+0x1b47/0x2400 net/mptcp/sockopt.c:638

Remove support for TCP_ULP setsockopt.

References

Affected packages

Git /

Affected ranges

Database specific

unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "5.13"
            },
            {
                "fixed": "5.15.11"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "5.16-rc1"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "5.16-rc2"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "5.16-rc3"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "5.16-rc4"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "5.16-rc5"
            }
        ]
    }
]
source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47591.json"