
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability in the Linux kernel's TCP implementation was discovered, identified as CVE-2021-4442. The issue involves insufficient sanity checks in the TCPQUEUESEQ functionality, specifically when handling TCP repair mode operations. The vulnerability was reported by Qingyu Li through the syzkaller bug detection system (Kernel Git).
The vulnerability occurs when the TCPQUEUESEQ operation is performed after restoring data in the receive queue, allowing changes to RCV SEQ that should not be permitted. The issue manifests when a sequence number is modified while data is still present in the queues, which should be prohibited as TCPQUEUESEQ should only be used when queues are empty. The bug was demonstrated through a test case involving socket operations and TCP repair mode settings (Kernel Git).
When exploited, this vulnerability can lead to incorrect sequence number handling in TCP connections, potentially resulting in connection resets and warnings in the system log. The impact includes potential denial of service conditions due to connection disruptions (Kernel Git).
The issue has been fixed by adding sanity tests to TCPQUEUESEQ operations. The patch ensures that sequence numbers can only be modified when the respective queues are empty, preventing invalid state modifications. The fix was implemented through additional checks in the tcprtxqueue_empty function for the send queue and sequence number comparison for the receive queue (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."