In the Linux kernel, the following vulnerability has been resolved: netfilter: xt_tcpmss: check remaining length before reading optlen Quoting reporter: In net/netfilter/xt_tcpmss.c (lines 53-68), the TCP option parser reads op[i+1] directly without validating the remaining option length. If the last byte of the option field is not EOL/NOP (0/1), the code attempts to index op[i+1]. In the case where i + 1 == optlen, this causes an out-of-bounds read, accessing memory past the optlen boundary (either reading beyond the stack buffer _opt or the following payload).
| Date Added | Due Date | Vulnerability Name | Required Action |
|---|---|---|---|
| N/A |
| Type | Version | Base score | Base severity | Vector |
|---|---|---|---|---|
| Secondary | 3.1 | 8.2 | HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H |
| Hyperlink | Source | Resource |
|---|---|---|
| https://git.kernel.org/stable/c/07a9b32eaae792ff7d0fcac14d8920c937c0a9c3 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Patch |
| https://git.kernel.org/stable/c/5e13d0a37666955b6cfddc0f73cb40ed645b8a05 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Patch |
| https://git.kernel.org/stable/c/735ee8582da3d239eb0c7a53adca61b79fb228b3 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Patch |
| https://git.kernel.org/stable/c/8b300f726640c48c3edfe9c453334dd801f4b74e | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Patch |
| https://git.kernel.org/stable/c/cd5beda7e0e32865e214f28034bb92c1cecff885 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Patch |
| https://git.kernel.org/stable/c/eaedc0bc18be46fe7f58170e967959a932c4f824 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Patch |
| https://git.kernel.org/stable/c/f6c412dcfd76b0516d51aa847d8f4c7b70381b09 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Patch |
| https://git.kernel.org/stable/c/f895191dc32c53eaf443b6443fe40945b2f92287 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Patch |