vulnerability
Ubuntu: (CVE-2021-21404): syncthing vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:N/I:N/A:P) | Apr 6, 2021 | Jun 26, 2025 | Aug 18, 2025 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Apr 6, 2021
Added
Jun 26, 2025
Modified
Aug 18, 2025
Description
Syncthing is a continuous file synchronization program. In Syncthing before version 1.15.0, the relay server `strelaysrv` can be caused to crash and exit by sending a relay message with a negative length field. Similarly, Syncthing itself can crash for the same reason if given a malformed message from a malicious relay server when attempting to join the relay. Relay joins are essentially random (from a subset of low latency relays) and Syncthing will by default restart when crashing, at which point it's likely to pick another non-malicious relay. This flaw is fixed in version 1.15.0.
Solution
no-fix-ubuntu-package
References
- CVE-2021-21404
- https://attackerkb.com/topics/CVE-2021-21404
- CWE-20
- URL-https://github.com/syncthing/syncthing/commit/fb4fdaf4c0a79c22cad000c42ac1394e3ccb6a97
- URL-https://github.com/syncthing/syncthing/releases/tag/v1.15.0
- URL-https://github.com/syncthing/syncthing/security/advisories/GHSA-x462-89pf-6r5h
- URL-https://pkg.go.dev/github.com/syncthing/syncthing
- URL-https://www.cve.org/CVERecord?id=CVE-2021-21404
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.