U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2021-47245 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: netfilter: synproxy: Fix out of bounds when parsing TCP options The TCP option parser in synproxy (synproxy_parse_options) could read one byte out of bounds. When the length is 1, the execution flow gets into the loop, reads one byte of the opcode, and if the opcode is neither TCPOPT_EOL nor TCPOPT_NOP, it reads one more byte, which exceeds the length of 1. This fix is inspired by commit 9609dad263f8 ("ipv4: tcp_input: fix stack out of bounds when parsing TCP options."). v2 changes: Added an early return when length < 0 to avoid calling skb_header_pointer with negative length.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/576c1526b4d83c44ad7b673cb841f36cbc6cb6c4 Patch 
https://git.kernel.org/stable/c/576c1526b4d83c44ad7b673cb841f36cbc6cb6c4 Patch 
https://git.kernel.org/stable/c/5fc177ab759418c9537433e63301096e733fb915 Patch 
https://git.kernel.org/stable/c/5fc177ab759418c9537433e63301096e733fb915 Patch 
https://git.kernel.org/stable/c/674b5f0c6a4fc5d3abce877048290cea6091fcb1 Patch 
https://git.kernel.org/stable/c/674b5f0c6a4fc5d3abce877048290cea6091fcb1 Patch 
https://git.kernel.org/stable/c/6defc77d48eff74075b80ad5925061b2fc010d98 Patch 
https://git.kernel.org/stable/c/6defc77d48eff74075b80ad5925061b2fc010d98 Patch 
https://git.kernel.org/stable/c/7d9a9a1a88a3da574e019b4de756bc73337b3b0b Patch 
https://git.kernel.org/stable/c/7d9a9a1a88a3da574e019b4de756bc73337b3b0b Patch 
https://git.kernel.org/stable/c/9cdf299ba4e153b5e56187648420de22c6216f02 Patch 
https://git.kernel.org/stable/c/9cdf299ba4e153b5e56187648420de22c6216f02 Patch 
https://git.kernel.org/stable/c/e1eb98cfeafdd85537e7e3cefe93ca9bfbcc3ea8 Patch 
https://git.kernel.org/stable/c/e1eb98cfeafdd85537e7e3cefe93ca9bfbcc3ea8 Patch 
https://git.kernel.org/stable/c/f648089337cb8ed40b2bb96e244f72b9d97dc96b Patch 
https://git.kernel.org/stable/c/f648089337cb8ed40b2bb96e244f72b9d97dc96b Patch 

Weakness Enumeration

CWE-ID CWE Name Source
CWE-125 Out-of-bounds Read cwe source acceptance level NIST  

Known Affected Software Configurations Switch to CPE 2.2

CPEs loading, please wait.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

4 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2021-47245
NVD Published Date:
05/21/2024
NVD Last Modified:
12/30/2024
Source:
kernel.org