CVE-2021-47065

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
29/02/2024
Last modified:
10/12/2024

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> rtw88: Fix array overrun in rtw_get_tx_power_params()<br /> <br /> Using a kernel with the Undefined Behaviour Sanity Checker (UBSAN) enabled, the<br /> following array overrun is logged:<br /> <br /> ================================================================================<br /> UBSAN: array-index-out-of-bounds in /home/finger/wireless-drivers-next/drivers/net/wireless/realtek/rtw88/phy.c:1789:34<br /> index 5 is out of range for type &amp;#39;u8 [5]&amp;#39;<br /> CPU: 2 PID: 84 Comm: kworker/u16:3 Tainted: G O 5.12.0-rc5-00086-gd88bba47038e-dirty #651<br /> Hardware name: TOSHIBA TECRA A50-A/TECRA A50-A, BIOS Version 4.50 09/29/2014<br /> Workqueue: phy0 ieee80211_scan_work [mac80211]<br /> Call Trace:<br /> dump_stack+0x64/0x7c<br /> ubsan_epilogue+0x5/0x40<br /> __ubsan_handle_out_of_bounds.cold+0x43/0x48<br /> rtw_get_tx_power_params+0x83a/drivers/net/wireless/realtek/rtw88/0xad0 [rtw_core]<br /> ? rtw_pci_read16+0x20/0x20 [rtw_pci]<br /> ? check_hw_ready+0x50/0x90 [rtw_core]<br /> rtw_phy_get_tx_power_index+0x4d/0xd0 [rtw_core]<br /> rtw_phy_set_tx_power_level+0xee/0x1b0 [rtw_core]<br /> rtw_set_channel+0xab/0x110 [rtw_core]<br /> rtw_ops_config+0x87/0xc0 [rtw_core]<br /> ieee80211_hw_config+0x9d/0x130 [mac80211]<br /> ieee80211_scan_state_set_channel+0x81/0x170 [mac80211]<br /> ieee80211_scan_work+0x19f/0x2a0 [mac80211]<br /> process_one_work+0x1dd/0x3a0<br /> worker_thread+0x49/0x330<br /> ? rescuer_thread+0x3a0/0x3a0<br /> kthread+0x134/0x150<br /> ? kthread_create_worker_on_cpu+0x70/0x70<br /> ret_from_fork+0x22/0x30<br /> ================================================================================<br /> <br /> The statement where an array is being overrun is shown in the following snippet:<br /> <br /> if (rate cck_base[group];<br /> else<br /> ====&gt; tx_power = pwr_idx_2g-&gt;bw40_base[group];<br /> <br /> The associated arrays are defined in main.h as follows:<br /> <br /> struct rtw_2g_txpwr_idx {<br /> u8 cck_base[6];<br /> u8 bw40_base[5];<br /> struct rtw_2g_1s_pwr_idx_diff ht_1s_diff;<br /> struct rtw_2g_ns_pwr_idx_diff ht_2s_diff;<br /> struct rtw_2g_ns_pwr_idx_diff ht_3s_diff;<br /> struct rtw_2g_ns_pwr_idx_diff ht_4s_diff;<br /> };<br /> <br /> The problem arises because the value of group is 5 for channel 14. The trivial<br /> increase in the dimension of bw40_base fails as this struct must match the layout of<br /> efuse. The fix is to add the rate as an argument to rtw_get_channel_group() and set<br /> the group for channel 14 to 4 if rate

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.3 (including) 5.4.119 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.37 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.11.21 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.12 (including) 5.12.4 (excluding)