Bug 1224839 (CVE-2021-47244)

Summary: VUL-0: CVE-2021-47244: kernel: mptcp: Fix out of bounds when parsing TCP options
Product: [Novell Products] SUSE Security Incidents Reporter: SMASH SMASH <smash_bz>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: RESOLVED FIXED QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: gabriele.sonnu, mhocko
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/406872/
Whiteboard: CVSSv3.1:SUSE:CVE-2021-47244:5.5:(AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description SMASH SMASH 2024-05-22 08:09:43 UTC
In the Linux kernel, the following vulnerability has been resolved:

mptcp: Fix out of bounds when parsing TCP options

The TCP option parser in mptcp (mptcp_get_options) could read one byte
out of bounds. When the length is 1, the execution flow gets into the
loop, reads one byte of the opcode, and if the opcode is neither
TCPOPT_EOL nor TCPOPT_NOP, it reads one more byte, which exceeds the
length of 1.

This fix is inspired by commit 9609dad263f8 ("ipv4: tcp_input: fix stack
out of bounds when parsing TCP options.").

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-47244
https://www.cve.org/CVERecord?id=CVE-2021-47244
https://git.kernel.org/stable/c/07718be265680dcf496347d475ce1a5442f55ad7
https://git.kernel.org/stable/c/73eeba71dc9932970befa009e68272a3d5ec4a58
https://git.kernel.org/stable/c/76e02b8905d0691e89e104a882f3bba7dd0f6037
https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2021/CVE-2021-47244.mbox
Comment 2 Michal Hocko 2024-05-23 15:52:02 UTC
Nothing to be done here
Comment 3 Gabriele Sonnu 2024-06-10 12:22:09 UTC
All done, closing.