{"id":"CVE-2021-47152","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: fix data stream corruption\n\nMaxim reported several issues when forcing a TCP transparent proxy\nto use the MPTCP protocol for the inbound connections. He also\nprovided a clean reproducer.\n\nThe problem boils down to 'mptcp_frag_can_collapse_to()' assuming\nthat only MPTCP will use the given page_frag.\n\nIf others - e.g. the plain TCP protocol - allocate page fragments,\nwe can end-up re-using already allocated memory for mptcp_data_frag.\n\nFix the issue ensuring that the to-be-expanded data fragment is\nlocated at the current page frag end.\n\nv1 -\u003e v2:\n - added missing fixes tag (Mat)","modified":"2026-03-14T11:18:59.353445Z","published":"2024-03-25T09:15:09.357Z","references":[{"type":"FIX","url":"https://git.kernel.org/stable/c/18e7f0580da15cac1e79d73683ada5a9e70980f8"},{"type":"FIX","url":"https://git.kernel.org/stable/c/29249eac5225429b898f278230a6ca2baa1ae154"},{"type":"FIX","url":"https://git.kernel.org/stable/c/3267a061096efc91eda52c2a0c61ba76e46e4b34"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"5.7"},{"fixed":"5.10.42"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.12.9"}]},{"events":[{"introduced":"0"},{"last_affected":"5.13-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"5.13-rc2"}]},{"events":[{"introduced":"0"},{"last_affected":"5.13-rc3"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47152.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}