CVE-2021-47160

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
25/03/2024
Last modified:
13/03/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: dsa: mt7530: fix VLAN traffic leaks<br /> <br /> PCR_MATRIX field was set to all 1&amp;#39;s when VLAN filtering is enabled, but<br /> was not reset when it is disabled, which may cause traffic leaks:<br /> <br /> ip link add br0 type bridge vlan_filtering 1<br /> ip link add br1 type bridge vlan_filtering 1<br /> ip link set swp0 master br0<br /> ip link set swp1 master br1<br /> ip link set br0 type bridge vlan_filtering 0<br /> ip link set br1 type bridge vlan_filtering 0<br /> # traffic in br0 and br1 will start leaking to each other<br /> <br /> As port_bridge_{add,del} have set up PCR_MATRIX properly, remove the<br /> PCR_MATRIX write from mt7530_port_set_vlan_aware.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.16 (including) 4.19.193 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.124 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.42 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.12.9 (excluding)
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*