blob: 8bbed3c2385cbe65f0ff29603df6de3e87fe726d [file] [log] [blame]
{
"containers": {
"cna": {
"providerMetadata": {
"orgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038"
},
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmac80211: fix use-after-free in CCMP/GCMP RX\n\nWhen PN checking is done in mac80211, for fragmentation we need\nto copy the PN to the RX struct so we can later use it to do a\ncomparison, since commit bf30ca922a0c (\"mac80211: check defrag\nPN against current frame\").\n\nUnfortunately, in that commit I used the 'hdr' variable without\nit being necessarily valid, so use-after-free could occur if it\nwas necessary to reallocate (parts of) the frame.\n\nFix this by reloading the variable after the code that results\nin the reallocations, if any.\n\nThis fixes https://bugzilla.kernel.org/show_bug.cgi?id=214401."
}
],
"affected": [
{
"product": "Linux",
"vendor": "Linux",
"defaultStatus": "unaffected",
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"programFiles": [
"net/mac80211/wpa.c"
],
"versions": [
{
"version": "608b0a2ae928a74a2f89e02227339dd79cdb63cf",
"lessThan": "447d001b875d0e7f211c4ba004916028da994258",
"status": "affected",
"versionType": "git"
},
{
"version": "d0f613fe6de344dc17ba04a88921a2094c13d3fa",
"lessThan": "31de381aef0ab1b342f62485118dc8a19363dc78",
"status": "affected",
"versionType": "git"
},
{
"version": "a9b57952fed41556c950a92123086724eaf11919",
"lessThan": "f556e1d6fb9f2923a9a36f3df638c7d79ba09dbb",
"status": "affected",
"versionType": "git"
},
{
"version": "0f716b48ed25503e6961f4b5b40ece36f7e4ed26",
"lessThan": "3d5d629c99c468458022e9b381789de3595bf4dd",
"status": "affected",
"versionType": "git"
},
{
"version": "c8b3a6150dc8ac78d5fdd5fbdfc4806249ef8b2c",
"lessThan": "50149e0866a82cef33e680ee68dc380a5bc75d32",
"status": "affected",
"versionType": "git"
},
{
"version": "e64ea0597050157f926ac2ba9b478a44ee5be945",
"lessThan": "57de2dcb18742dc2860861c9f496da7d42b67da0",
"status": "affected",
"versionType": "git"
},
{
"version": "bf30ca922a0c0176007e074b0acc77ed345e9990",
"lessThan": "27d3eb5616ee2c0a3b30c3fa34813368ed1f3dc9",
"status": "affected",
"versionType": "git"
},
{
"version": "bf30ca922a0c0176007e074b0acc77ed345e9990",
"lessThan": "94513069eb549737bcfc3d988d6ed4da948a2de8",
"status": "affected",
"versionType": "git"
},
{
"version": "1f0bf30c01d3f4de7d6c5e27b102a808c5646676",
"status": "affected",
"versionType": "git"
}
]
},
{
"product": "Linux",
"vendor": "Linux",
"defaultStatus": "affected",
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"programFiles": [
"net/mac80211/wpa.c"
],
"versions": [
{
"version": "5.13",
"status": "affected"
},
{
"version": "0",
"lessThan": "5.13",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "4.4.286",
"lessThanOrEqual": "4.4.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "4.9.285",
"lessThanOrEqual": "4.9.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "4.14.249",
"lessThanOrEqual": "4.14.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "4.19.209",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "5.4.151",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "5.10.71",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "5.14.10",
"lessThanOrEqual": "5.14.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "5.15",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.4.271",
"versionEndExcluding": "4.4.286"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.9.271",
"versionEndExcluding": "4.9.285"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.14.235",
"versionEndExcluding": "4.14.249"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.19.193",
"versionEndExcluding": "4.19.209"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.4.124",
"versionEndExcluding": "5.4.151"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10.42",
"versionEndExcluding": "5.10.71"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.13",
"versionEndExcluding": "5.14.10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.13",
"versionEndExcluding": "5.15"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.12.9"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/447d001b875d0e7f211c4ba004916028da994258"
},
{
"url": "https://git.kernel.org/stable/c/31de381aef0ab1b342f62485118dc8a19363dc78"
},
{
"url": "https://git.kernel.org/stable/c/f556e1d6fb9f2923a9a36f3df638c7d79ba09dbb"
},
{
"url": "https://git.kernel.org/stable/c/3d5d629c99c468458022e9b381789de3595bf4dd"
},
{
"url": "https://git.kernel.org/stable/c/50149e0866a82cef33e680ee68dc380a5bc75d32"
},
{
"url": "https://git.kernel.org/stable/c/57de2dcb18742dc2860861c9f496da7d42b67da0"
},
{
"url": "https://git.kernel.org/stable/c/27d3eb5616ee2c0a3b30c3fa34813368ed1f3dc9"
},
{
"url": "https://git.kernel.org/stable/c/94513069eb549737bcfc3d988d6ed4da948a2de8"
}
],
"title": "mac80211: fix use-after-free in CCMP/GCMP RX",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
"cveID": "CVE-2021-47388",
"requesterUserId": "gregkh@kernel.org",
"serial": "1",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.0"
}