CVE-2021-47388

In the Linux kernel, the following vulnerability has been resolved: mac80211: fix use-after-free in CCMP/GCMP RX When PN checking is done in mac80211, for fragmentation we need to copy the PN to the RX struct so we can later use it to do a comparison, since commit bf30ca922a0c ("mac80211: check defrag PN against current frame"). Unfortunately, in that commit I used the 'hdr' variable without it being necessarily valid, so use-after-free could occur if it was necessary to reallocate (parts of) the frame. Fix this by reloading the variable after the code that results in the reallocations, if any. This fixes https://bugzilla.kernel.org/show_bug.cgi?id=214401.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*

History

30 Dec 2024, 20:05

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://git.kernel.org/stable/c/27d3eb5616ee2c0a3b30c3fa34813368ed1f3dc9 - () https://git.kernel.org/stable/c/27d3eb5616ee2c0a3b30c3fa34813368ed1f3dc9 - Patch
References () https://git.kernel.org/stable/c/31de381aef0ab1b342f62485118dc8a19363dc78 - () https://git.kernel.org/stable/c/31de381aef0ab1b342f62485118dc8a19363dc78 - Patch
References () https://git.kernel.org/stable/c/3d5d629c99c468458022e9b381789de3595bf4dd - () https://git.kernel.org/stable/c/3d5d629c99c468458022e9b381789de3595bf4dd - Patch
References () https://git.kernel.org/stable/c/447d001b875d0e7f211c4ba004916028da994258 - () https://git.kernel.org/stable/c/447d001b875d0e7f211c4ba004916028da994258 - Patch
References () https://git.kernel.org/stable/c/50149e0866a82cef33e680ee68dc380a5bc75d32 - () https://git.kernel.org/stable/c/50149e0866a82cef33e680ee68dc380a5bc75d32 - Patch
References () https://git.kernel.org/stable/c/57de2dcb18742dc2860861c9f496da7d42b67da0 - () https://git.kernel.org/stable/c/57de2dcb18742dc2860861c9f496da7d42b67da0 - Patch
References () https://git.kernel.org/stable/c/94513069eb549737bcfc3d988d6ed4da948a2de8 - () https://git.kernel.org/stable/c/94513069eb549737bcfc3d988d6ed4da948a2de8 - Patch
References () https://git.kernel.org/stable/c/f556e1d6fb9f2923a9a36f3df638c7d79ba09dbb - () https://git.kernel.org/stable/c/f556e1d6fb9f2923a9a36f3df638c7d79ba09dbb - Patch

21 Nov 2024, 06:36

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mac80211: corrige el use after free en CCMP/GCMP RX. Cuando se realiza la verificación de PN en mac80211, para la fragmentación necesitamos copiar el PN a la estructura RX para poder usarlo más tarde. para hacer una comparación, desde la confirmación bf30ca922a0c ("mac80211: verifique la desfragmentación PN con el marco actual"). Desafortunadamente, en esa confirmación utilicé la variable 'hdr' sin que fuera necesariamente válida, por lo que podría ocurrir un use after free si fuera necesario reasignar (partes de) el marco. Solucione este problema recargando la variable después del código que da como resultado las reasignaciones, si corresponde. Esto corrige https://bugzilla.kernel.org/show_bug.cgi?id=214401.
References () https://git.kernel.org/stable/c/27d3eb5616ee2c0a3b30c3fa34813368ed1f3dc9 - () https://git.kernel.org/stable/c/27d3eb5616ee2c0a3b30c3fa34813368ed1f3dc9 -
References () https://git.kernel.org/stable/c/31de381aef0ab1b342f62485118dc8a19363dc78 - () https://git.kernel.org/stable/c/31de381aef0ab1b342f62485118dc8a19363dc78 -
References () https://git.kernel.org/stable/c/3d5d629c99c468458022e9b381789de3595bf4dd - () https://git.kernel.org/stable/c/3d5d629c99c468458022e9b381789de3595bf4dd -
References () https://git.kernel.org/stable/c/447d001b875d0e7f211c4ba004916028da994258 - () https://git.kernel.org/stable/c/447d001b875d0e7f211c4ba004916028da994258 -
References () https://git.kernel.org/stable/c/50149e0866a82cef33e680ee68dc380a5bc75d32 - () https://git.kernel.org/stable/c/50149e0866a82cef33e680ee68dc380a5bc75d32 -
References () https://git.kernel.org/stable/c/57de2dcb18742dc2860861c9f496da7d42b67da0 - () https://git.kernel.org/stable/c/57de2dcb18742dc2860861c9f496da7d42b67da0 -
References () https://git.kernel.org/stable/c/94513069eb549737bcfc3d988d6ed4da948a2de8 - () https://git.kernel.org/stable/c/94513069eb549737bcfc3d988d6ed4da948a2de8 -
References () https://git.kernel.org/stable/c/f556e1d6fb9f2923a9a36f3df638c7d79ba09dbb - () https://git.kernel.org/stable/c/f556e1d6fb9f2923a9a36f3df638c7d79ba09dbb -

21 May 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-21 15:15

Updated : 2024-12-30 20:05


NVD link : CVE-2021-47388

Mitre link : CVE-2021-47388

CVE.ORG link : CVE-2021-47388


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free