CVE-2021-47010

In the Linux kernel, the following vulnerability has been resolved: net: Only allow init netns to set default tcp cong to a restricted algo tcp_set_default_congestion_control() is netns-safe in that it writes to &net->ipv4.tcp_congestion_control, but it also sets ca->flags |= TCP_CONG_NON_RESTRICTED which is not namespaced. This has the unintended side-effect of changing the global net.ipv4.tcp_allowed_congestion_control sysctl, despite the fact that it is read-only: 97684f0970f6 ("net: Make tcp_allowed_congestion_control readonly in non-init netns") Resolve this netns "leak" by only allowing the init netns to set the default algorithm to one that is restricted. This restriction could be removed if tcp_allowed_congestion_control were namespace-ified in the future. This bug was uncovered with https://github.com/JonathonReinhart/linux-netns-sysctl-verify
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

19 Mar 2025, 15:30

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/6c1ea8bee75df8fe2184a50fcd0f70bf82986f42 - () https://git.kernel.org/stable/c/6c1ea8bee75df8fe2184a50fcd0f70bf82986f42 - Patch
References () https://git.kernel.org/stable/c/8d432592f30fcc34ef5a10aac4887b4897884493 - () https://git.kernel.org/stable/c/8d432592f30fcc34ef5a10aac4887b4897884493 - Patch
References () https://git.kernel.org/stable/c/9884f745108f7d25b189bbcd6754e284fb29ab68 - () https://git.kernel.org/stable/c/9884f745108f7d25b189bbcd6754e284fb29ab68 - Patch
References () https://git.kernel.org/stable/c/992de06308d9a9584d59b96d294ac676f924e437 - () https://git.kernel.org/stable/c/992de06308d9a9584d59b96d294ac676f924e437 - Patch
References () https://git.kernel.org/stable/c/e7d7bedd507bb732e600403b7a96f9fe48d0ca31 - () https://git.kernel.org/stable/c/e7d7bedd507bb732e600403b7a96f9fe48d0ca31 - Patch
References () https://git.kernel.org/stable/c/efe1532a6e1a8e3c343d04fff510f0ed80328f9c - () https://git.kernel.org/stable/c/efe1532a6e1a8e3c343d04fff510f0ed80328f9c - Patch
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

21 Nov 2024, 06:35

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/6c1ea8bee75df8fe2184a50fcd0f70bf82986f42 - () https://git.kernel.org/stable/c/6c1ea8bee75df8fe2184a50fcd0f70bf82986f42 -
References () https://git.kernel.org/stable/c/8d432592f30fcc34ef5a10aac4887b4897884493 - () https://git.kernel.org/stable/c/8d432592f30fcc34ef5a10aac4887b4897884493 -
References () https://git.kernel.org/stable/c/9884f745108f7d25b189bbcd6754e284fb29ab68 - () https://git.kernel.org/stable/c/9884f745108f7d25b189bbcd6754e284fb29ab68 -
References () https://git.kernel.org/stable/c/992de06308d9a9584d59b96d294ac676f924e437 - () https://git.kernel.org/stable/c/992de06308d9a9584d59b96d294ac676f924e437 -
References () https://git.kernel.org/stable/c/e7d7bedd507bb732e600403b7a96f9fe48d0ca31 - () https://git.kernel.org/stable/c/e7d7bedd507bb732e600403b7a96f9fe48d0ca31 -
References () https://git.kernel.org/stable/c/efe1532a6e1a8e3c343d04fff510f0ed80328f9c - () https://git.kernel.org/stable/c/efe1532a6e1a8e3c343d04fff510f0ed80328f9c -

07 Aug 2024, 16:35

Type Values Removed Values Added
CWE CWE-400
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

28 Feb 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-28 09:15

Updated : 2025-03-19 15:30


NVD link : CVE-2021-47010

Mitre link : CVE-2021-47010

CVE.ORG link : CVE-2021-47010


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-400

Uncontrolled Resource Consumption