In the Linux kernel, the following vulnerability has been resolved:
mptcp: Fix out of bounds when parsing TCP options
The TCP option parser in mptcp (mptcp_get_options) could read one byte
out of bounds. When the length is 1, the execution flow gets into the
loop, reads one byte of the opcode, and if the opcode is neither
TCPOPT_EOL nor TCPOPT_NOP, it reads one more byte, which exceeds the
length of 1.
This fix is inspired by commit 9609dad263f8 ("ipv4: tcp_input: fix stack
out of bounds when parsing TCP options.").
References
Configurations
Configuration 1 (hide)
|
History
04 Apr 2025, 14:30
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linux
Linux linux Kernel |
|
CWE | CWE-125 | |
CPE | cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:* |
|
References | () https://git.kernel.org/stable/c/07718be265680dcf496347d475ce1a5442f55ad7 - Patch | |
References | () https://git.kernel.org/stable/c/73eeba71dc9932970befa009e68272a3d5ec4a58 - Patch | |
References | () https://git.kernel.org/stable/c/76e02b8905d0691e89e104a882f3bba7dd0f6037 - Patch |
Information
Published : 2024-05-21 15:15
Updated : 2025-04-04 14:30
NVD link : CVE-2021-47244
Mitre link : CVE-2021-47244
CVE.ORG link : CVE-2021-47244
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read