vulnerability

Amazon Linux AMI: CVE-2021-47245: Security patch for kernel (ALAS-2024-1952)

Severity
6
CVSS
(AV:L/AC:L/Au:S/C:C/I:N/A:C)
Published
May 21, 2024
Added
Mar 14, 2025
Modified
May 21, 2025

Description

In the Linux kernel, the following vulnerability has been resolved:



netfilter: synproxy: Fix out of bounds when parsing TCP options



The TCP option parser in synproxy (synproxy_parse_options) could read


one byte out of bounds. When the length is 1, the execution flow gets


into the loop, reads one byte of the opcode, and if the opcode is


neither TCPOPT_EOL nor TCPOPT_NOP, it reads one more byte, which exceeds


the length of 1.



This fix is inspired by commit 9609dad263f8 ("ipv4: tcp_input: fix stack


out of bounds when parsing TCP options.").



v2 changes:



Added an early return when length < 0 to avoid calling


skb_header_pointer with negative length.

Solution

amazon-linux-upgrade-kernel
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.