CVE-2021-47591: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: mptcp: remove tcp ulp setsockopt support TCP_ULP setsockopt cannot be used for mptcp because its already used internally to plumb subflow (tcp) sockets to the mptcp layer. syzbot managed to trigger a crash for mptcp connections that are in fallback mode: KASAN: null-ptr-deref in range [0x0000000000000020-0x0000000000000027] CPU: 1 PID: 1083 Comm: syz-executor.3 Not tainted 5.16.0-rc2-syzkaller #0 RIP: 0010:tls_build_proto net/tls/tls_main.c:776 [inline] [..] __tcp_set_ulp net/ipv4/tcp_ulp.c:139 [inline] tcp_set_ulp+0x428/0x4c0 net/ipv4/tcp_ulp.c:160 do_tcp_setsockopt+0x455/0x37c0 net/ipv4/tcp.c:3391 mptcp_setsockopt+0x1b47/0x2400 net/mptcp/sockopt.c:638 Remove support for TCP_ULP setsockopt.
AI Analysis
Technical Summary
CVE-2021-47591 is a vulnerability identified in the Linux kernel's implementation of Multipath TCP (MPTCP), specifically related to the TCP_ULP (TCP Upper Layer Protocol) setsockopt support. MPTCP is an extension of TCP that allows multiple paths to be used simultaneously between two endpoints, improving redundancy and throughput. The vulnerability arises because the TCP_ULP setsockopt interface, which is used to attach upper layer protocols to TCP sockets, cannot be safely used with MPTCP sockets. This is due to the internal use of TCP_ULP setsockopt within the MPTCP implementation to manage subflow sockets. The issue was discovered by syzbot, an automated kernel fuzzer, which triggered a null pointer dereference crash when attempting to use TCP_ULP setsockopt on MPTCP connections in fallback mode. The crash occurs in the kernel address sanitizer (KASAN) detected null pointer dereference in the tls_build_proto function in the TLS subsystem, called from tcp_ulp.c and mptcp sockopt handling code. This indicates that the setsockopt call attempts to access invalid memory, leading to kernel panic or denial of service. The fix involves removing support for TCP_ULP setsockopt on MPTCP sockets to prevent this unsafe operation. This vulnerability affects Linux kernel versions including the 5.16.0-rc2 release candidate and potentially others using the affected commit hashes. No known exploits are reported in the wild, and no CVSS score has been assigned yet. However, the vulnerability can cause kernel crashes and potential denial of service on systems using MPTCP with TCP_ULP setsockopt, especially in fallback mode scenarios.
Potential Impact
For European organizations, the impact of CVE-2021-47591 primarily concerns systems running Linux kernels with MPTCP enabled and using TCP_ULP setsockopt functionality, such as advanced networking setups or specialized applications leveraging MPTCP for redundancy or performance. The vulnerability can lead to kernel crashes resulting in denial of service, which may disrupt critical services, especially in infrastructure relying on Linux servers for networking, cloud services, or telecommunications. Organizations in sectors like finance, telecommunications, and cloud service providers could face service interruptions or degraded network reliability. While no direct remote code execution or privilege escalation is indicated, repeated crashes could be exploited to cause persistent service outages. The lack of known exploits reduces immediate risk, but the vulnerability highlights the need for careful kernel configuration and patching to maintain system stability. Given the increasing adoption of MPTCP in mobile networks and data centers, European entities deploying such technologies must assess exposure and prioritize remediation to avoid operational disruptions.
Mitigation Recommendations
To mitigate CVE-2021-47591, European organizations should: 1) Apply the latest Linux kernel patches that remove TCP_ULP setsockopt support for MPTCP sockets, ensuring the kernel version includes the fix. 2) Audit systems to identify usage of MPTCP and TCP_ULP setsockopt calls, disabling or restricting these features if not required. 3) For environments requiring MPTCP, test updated kernels in staging to confirm stability and absence of fallback mode crashes. 4) Monitor kernel logs for signs of null pointer dereference or crashes related to tcp_ulp or mptcp sockopt operations. 5) Implement kernel hardening and memory protection features such as KASAN in development or testing environments to detect similar issues early. 6) Coordinate with application developers to avoid using TCP_ULP setsockopt on MPTCP sockets. 7) Maintain robust incident response plans to quickly recover from potential denial of service caused by kernel crashes. These steps go beyond generic advice by focusing on kernel patching, configuration auditing, and proactive monitoring specific to MPTCP and TCP_ULP interactions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Norway, Denmark, Italy, Spain
CVE-2021-47591: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: mptcp: remove tcp ulp setsockopt support TCP_ULP setsockopt cannot be used for mptcp because its already used internally to plumb subflow (tcp) sockets to the mptcp layer. syzbot managed to trigger a crash for mptcp connections that are in fallback mode: KASAN: null-ptr-deref in range [0x0000000000000020-0x0000000000000027] CPU: 1 PID: 1083 Comm: syz-executor.3 Not tainted 5.16.0-rc2-syzkaller #0 RIP: 0010:tls_build_proto net/tls/tls_main.c:776 [inline] [..] __tcp_set_ulp net/ipv4/tcp_ulp.c:139 [inline] tcp_set_ulp+0x428/0x4c0 net/ipv4/tcp_ulp.c:160 do_tcp_setsockopt+0x455/0x37c0 net/ipv4/tcp.c:3391 mptcp_setsockopt+0x1b47/0x2400 net/mptcp/sockopt.c:638 Remove support for TCP_ULP setsockopt.
AI-Powered Analysis
Technical Analysis
CVE-2021-47591 is a vulnerability identified in the Linux kernel's implementation of Multipath TCP (MPTCP), specifically related to the TCP_ULP (TCP Upper Layer Protocol) setsockopt support. MPTCP is an extension of TCP that allows multiple paths to be used simultaneously between two endpoints, improving redundancy and throughput. The vulnerability arises because the TCP_ULP setsockopt interface, which is used to attach upper layer protocols to TCP sockets, cannot be safely used with MPTCP sockets. This is due to the internal use of TCP_ULP setsockopt within the MPTCP implementation to manage subflow sockets. The issue was discovered by syzbot, an automated kernel fuzzer, which triggered a null pointer dereference crash when attempting to use TCP_ULP setsockopt on MPTCP connections in fallback mode. The crash occurs in the kernel address sanitizer (KASAN) detected null pointer dereference in the tls_build_proto function in the TLS subsystem, called from tcp_ulp.c and mptcp sockopt handling code. This indicates that the setsockopt call attempts to access invalid memory, leading to kernel panic or denial of service. The fix involves removing support for TCP_ULP setsockopt on MPTCP sockets to prevent this unsafe operation. This vulnerability affects Linux kernel versions including the 5.16.0-rc2 release candidate and potentially others using the affected commit hashes. No known exploits are reported in the wild, and no CVSS score has been assigned yet. However, the vulnerability can cause kernel crashes and potential denial of service on systems using MPTCP with TCP_ULP setsockopt, especially in fallback mode scenarios.
Potential Impact
For European organizations, the impact of CVE-2021-47591 primarily concerns systems running Linux kernels with MPTCP enabled and using TCP_ULP setsockopt functionality, such as advanced networking setups or specialized applications leveraging MPTCP for redundancy or performance. The vulnerability can lead to kernel crashes resulting in denial of service, which may disrupt critical services, especially in infrastructure relying on Linux servers for networking, cloud services, or telecommunications. Organizations in sectors like finance, telecommunications, and cloud service providers could face service interruptions or degraded network reliability. While no direct remote code execution or privilege escalation is indicated, repeated crashes could be exploited to cause persistent service outages. The lack of known exploits reduces immediate risk, but the vulnerability highlights the need for careful kernel configuration and patching to maintain system stability. Given the increasing adoption of MPTCP in mobile networks and data centers, European entities deploying such technologies must assess exposure and prioritize remediation to avoid operational disruptions.
Mitigation Recommendations
To mitigate CVE-2021-47591, European organizations should: 1) Apply the latest Linux kernel patches that remove TCP_ULP setsockopt support for MPTCP sockets, ensuring the kernel version includes the fix. 2) Audit systems to identify usage of MPTCP and TCP_ULP setsockopt calls, disabling or restricting these features if not required. 3) For environments requiring MPTCP, test updated kernels in staging to confirm stability and absence of fallback mode crashes. 4) Monitor kernel logs for signs of null pointer dereference or crashes related to tcp_ulp or mptcp sockopt operations. 5) Implement kernel hardening and memory protection features such as KASAN in development or testing environments to detect similar issues early. 6) Coordinate with application developers to avoid using TCP_ULP setsockopt on MPTCP sockets. 7) Maintain robust incident response plans to quickly recover from potential denial of service caused by kernel crashes. These steps go beyond generic advice by focusing on kernel patching, configuration auditing, and proactive monitoring specific to MPTCP and TCP_ULP interactions.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-24T15:11:00.733Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9833c4522896dcbe9540
Added to database: 5/21/2025, 9:09:07 AM
Last enriched: 6/30/2025, 3:09:52 PM
Last updated: 7/30/2025, 10:06:05 AM
Views: 12
Related Threats
CVE-2025-54475: CWE-89: Improper Neutralization of Special Elements used in an SQL Command in joomsky.com JS Jobs component for Joomla
HighCVE-2025-54474: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in dj-extensions.com DJ-Classifieds component for Joomla
HighCVE-2025-54473: CWE-434 Unrestricted Upload of File with Dangerous Type in phoca.cz phoca.cz - Phoca Commander for Joomla
CriticalCVE-2025-9050: SQL Injection in projectworlds Travel Management System
MediumCVE-2025-9047: SQL Injection in projectworlds Visitor Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.