CVE-2021-47633

Severity CVSS v4.0:
Pending analysis
Type:
CWE-125 Out-of-bounds Read
Publication date:
26/02/2025
Last modified:
23/09/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111<br /> <br /> The bug was found during fuzzing. Stacktrace locates it in<br /> ath5k_eeprom_convert_pcal_info_5111.<br /> When none of the curve is selected in the loop, idx can go<br /> up to AR5K_EEPROM_N_PD_CURVES. The line makes pd out of bound.<br /> pd = &amp;chinfo[pier].pd_curves[idx];<br /> <br /> There are many OOB writes using pd later in the code. So I<br /> added a sanity check for idx. Checks for other loops involving<br /> AR5K_EEPROM_N_PD_CURVES are not needed as the loop index is not<br /> used outside the loops.<br /> <br /> The patch is NOT tested with real device.<br /> <br /> The following is the fuzzing report<br /> <br /> BUG: KASAN: slab-out-of-bounds in ath5k_eeprom_read_pcal_info_5111+0x126a/0x1390 [ath5k]<br /> Write of size 1 at addr ffff8880174a4d60 by task modprobe/214<br /> <br /> CPU: 0 PID: 214 Comm: modprobe Not tainted 5.6.0 #1<br /> Call Trace:<br /> dump_stack+0x76/0xa0<br /> print_address_description.constprop.0+0x16/0x200<br /> ? ath5k_eeprom_read_pcal_info_5111+0x126a/0x1390 [ath5k]<br /> ? ath5k_eeprom_read_pcal_info_5111+0x126a/0x1390 [ath5k]<br /> __kasan_report.cold+0x37/0x7c<br /> ? ath5k_eeprom_read_pcal_info_5111+0x126a/0x1390 [ath5k]<br /> kasan_report+0xe/0x20<br /> ath5k_eeprom_read_pcal_info_5111+0x126a/0x1390 [ath5k]<br /> ? apic_timer_interrupt+0xa/0x20<br /> ? ath5k_eeprom_init_11a_pcal_freq+0xbc0/0xbc0 [ath5k]<br /> ? ath5k_pci_eeprom_read+0x228/0x3c0 [ath5k]<br /> ath5k_eeprom_init+0x2513/0x6290 [ath5k]<br /> ? ath5k_eeprom_init_11a_pcal_freq+0xbc0/0xbc0 [ath5k]<br /> ? usleep_range+0xb8/0x100<br /> ? apic_timer_interrupt+0xa/0x20<br /> ? ath5k_eeprom_read_pcal_info_2413+0x2f20/0x2f20 [ath5k]<br /> ath5k_hw_init+0xb60/0x1970 [ath5k]<br /> ath5k_init_ah+0x6fe/0x2530 [ath5k]<br /> ? kasprintf+0xa6/0xe0<br /> ? ath5k_stop+0x140/0x140 [ath5k]<br /> ? _dev_notice+0xf6/0xf6<br /> ? apic_timer_interrupt+0xa/0x20<br /> ath5k_pci_probe.cold+0x29a/0x3d6 [ath5k]<br /> ? ath5k_pci_eeprom_read+0x3c0/0x3c0 [ath5k]<br /> ? mutex_lock+0x89/0xd0<br /> ? ath5k_pci_eeprom_read+0x3c0/0x3c0 [ath5k]<br /> local_pci_probe+0xd3/0x160<br /> pci_device_probe+0x23f/0x3e0<br /> ? pci_device_remove+0x280/0x280<br /> ? pci_device_remove+0x280/0x280<br /> really_probe+0x209/0x5d0

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 2.6.30 (including) 4.9.311 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.10 (including) 4.14.276 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.15 (including) 4.19.238 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.189 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.111 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.34 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 5.16.20 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.17 (including) 5.17.3 (excluding)