Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2021-47152 First vendor Publication 2024-03-25
Vendor Cve Last vendor Modification 2025-03-13

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix data stream corruption

Maxim reported several issues when forcing a TCP transparent proxy to use the MPTCP protocol for the inbound connections. He also provided a clean reproducer.

The problem boils down to 'mptcp_frag_can_collapse_to()' assuming that only MPTCP will use the given page_frag.

If others - e.g. the plain TCP protocol - allocate page fragments, we can end-up re-using already allocated memory for mptcp_data_frag.

Fix the issue ensuring that the to-be-expanded data fragment is located at the current page frag end.

v1 -> v2:
- added missing fixes tag (Mat)

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47152

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-787 Out-of-bounds Write (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Os 3463

Sources (Detail)

https://git.kernel.org/stable/c/18e7f0580da15cac1e79d73683ada5a9e70980f8
https://git.kernel.org/stable/c/29249eac5225429b898f278230a6ca2baa1ae154
https://git.kernel.org/stable/c/3267a061096efc91eda52c2a0c61ba76e46e4b34
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
Date Informations
2025-07-15 01:53:08
  • Multiple Updates
2025-07-14 12:16:44
  • Multiple Updates
2025-06-26 01:51:59
  • Multiple Updates
2025-06-25 12:16:12
  • Multiple Updates
2025-06-24 01:56:27
  • Multiple Updates
2025-03-29 02:57:25
  • Multiple Updates
2025-03-28 13:27:47
  • Multiple Updates
2025-03-28 02:42:19
  • Multiple Updates
2025-03-17 21:25:00
  • Multiple Updates
2025-03-14 00:22:49
  • Multiple Updates
2024-11-25 09:26:24
  • Multiple Updates
2024-03-25 17:27:25
  • First insertion