Description
In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: Fix use after free for wext Key information in wext.connect is not reset on (re)connect and can hold data from a previous connection. Reset key data to avoid that drivers or mac80211 incorrectly detect a WEP connection request and access the freed or already reused memory. Additionally optimize cfg80211_sme_connect() and avoid an useless schedule of conn_work.
Product status
fffd0934b9390f34bec45762192b7edd3b12b4b5 (git) before 66af4a2ab1d65d556d638cb9555a3b823c2557a9
fffd0934b9390f34bec45762192b7edd3b12b4b5 (git) before a2a92b3e9d8e03ee3f9ee407fc46a9b4bd02d8b6
fffd0934b9390f34bec45762192b7edd3b12b4b5 (git) before 6f1959c17d4cb5b74af6fc31dc787e1dc3e4f6e2
fffd0934b9390f34bec45762192b7edd3b12b4b5 (git) before 2cfe78619b0de6d2da773978bc2d22797212eaa7
fffd0934b9390f34bec45762192b7edd3b12b4b5 (git) before fd081afd21eb35b968b0330700c43ec94986e1c4
fffd0934b9390f34bec45762192b7edd3b12b4b5 (git) before 22dfb21bf1cd876616d45cda1bc6daa89eec6747
fffd0934b9390f34bec45762192b7edd3b12b4b5 (git) before f4b6a138efb8a32507b8946104e32cb926308da7
fffd0934b9390f34bec45762192b7edd3b12b4b5 (git) before 015b8cc5e7c4d7bb671f1984d7b7338c310b185b
2.6.32
Any version before 2.6.32
4.14.308 (semver)
4.19.276 (semver)
5.4.235 (semver)
5.10.173 (semver)
5.15.99 (semver)
6.1.16 (semver)
6.2.3 (semver)
6.3 (original_commit_for_fix)
References
git.kernel.org/...c/66af4a2ab1d65d556d638cb9555a3b823c2557a9
git.kernel.org/...c/a2a92b3e9d8e03ee3f9ee407fc46a9b4bd02d8b6
git.kernel.org/...c/6f1959c17d4cb5b74af6fc31dc787e1dc3e4f6e2
git.kernel.org/...c/2cfe78619b0de6d2da773978bc2d22797212eaa7
git.kernel.org/...c/fd081afd21eb35b968b0330700c43ec94986e1c4
git.kernel.org/...c/22dfb21bf1cd876616d45cda1bc6daa89eec6747
git.kernel.org/...c/f4b6a138efb8a32507b8946104e32cb926308da7
git.kernel.org/...c/015b8cc5e7c4d7bb671f1984d7b7338c310b185b