{"id":"CVE-2021-47388","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nmac80211: fix use-after-free in CCMP/GCMP RX\n\nWhen PN checking is done in mac80211, for fragmentation we need\nto copy the PN to the RX struct so we can later use it to do a\ncomparison, since commit bf30ca922a0c (\"mac80211: check defrag\nPN against current frame\").\n\nUnfortunately, in that commit I used the 'hdr' variable without\nit being necessarily valid, so use-after-free could occur if it\nwas necessary to reallocate (parts of) the frame.\n\nFix this by reloading the variable after the code that results\nin the reallocations, if any.\n\nThis fixes https://bugzilla.kernel.org/show_bug.cgi?id=214401.","modified":"2026-03-15T22:43:12.726747Z","published":"2024-05-21T15:15:24.257Z","related":["SUSE-SU-2024:2008-1","SUSE-SU-2024:2010-1","SUSE-SU-2024:2011-1","SUSE-SU-2024:2019-1","SUSE-SU-2024:2183-1","SUSE-SU-2024:2185-1","SUSE-SU-2024:2189-1","SUSE-SU-2024:2190-1","SUSE-SU-2024:2892-1","SUSE-SU-2024:2901-1","SUSE-SU-2024:2940-1"],"references":[{"type":"FIX","url":"https://git.kernel.org/stable/c/31de381aef0ab1b342f62485118dc8a19363dc78"},{"type":"FIX","url":"https://git.kernel.org/stable/c/3d5d629c99c468458022e9b381789de3595bf4dd"},{"type":"FIX","url":"https://git.kernel.org/stable/c/447d001b875d0e7f211c4ba004916028da994258"},{"type":"FIX","url":"https://git.kernel.org/stable/c/50149e0866a82cef33e680ee68dc380a5bc75d32"},{"type":"FIX","url":"https://git.kernel.org/stable/c/57de2dcb18742dc2860861c9f496da7d42b67da0"},{"type":"FIX","url":"https://git.kernel.org/stable/c/94513069eb549737bcfc3d988d6ed4da948a2de8"},{"type":"FIX","url":"https://git.kernel.org/stable/c/f556e1d6fb9f2923a9a36f3df638c7d79ba09dbb"},{"type":"FIX","url":"https://git.kernel.org/stable/c/27d3eb5616ee2c0a3b30c3fa34813368ed1f3dc9"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"4.4.271"},{"fixed":"4.4.286"}]},{"events":[{"introduced":"4.9.271"},{"fixed":"4.9.285"}]},{"events":[{"introduced":"4.14.235"},{"fixed":"4.14.249"}]},{"events":[{"introduced":"4.19.193"},{"fixed":"4.19.209"}]},{"events":[{"introduced":"5.4.124"},{"fixed":"5.4.151"}]},{"events":[{"introduced":"5.10.42"},{"fixed":"5.10.71"}]},{"events":[{"introduced":"5.12.9"},{"fixed":"5.14.10"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc2"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc3"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47388.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}