CVE-2021-47602

In the Linux kernel, the following vulnerability has been resolved: mac80211: track only QoS data frames for admission control For admission control, obviously all of that only works for QoS data frames, otherwise we cannot even access the QoS field in the header. Syzbot reported (see below) an uninitialized value here due to a status of a non-QoS nullfunc packet, which isn't even long enough to contain the QoS header. Fix this to only do anything for QoS data packets.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

31 Oct 2024, 13:41

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc5:*:*:*:*:*:*
CWE CWE-824
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/eed897a22230e3231a740eddd7d6d95ba476625f - () https://git.kernel.org/stable/c/eed897a22230e3231a740eddd7d6d95ba476625f - Patch
References () https://git.kernel.org/stable/c/d5e568c3a4ec2ddd23e7dc5ad5b0c64e4f22981a - () https://git.kernel.org/stable/c/d5e568c3a4ec2ddd23e7dc5ad5b0c64e4f22981a - Patch
References () https://git.kernel.org/stable/c/69f054d6642c8f6173724ce17e7ee3ff66b8f682 - () https://git.kernel.org/stable/c/69f054d6642c8f6173724ce17e7ee3ff66b8f682 - Patch
References () https://git.kernel.org/stable/c/42d08e97b196479f593499e887a9ab81446a34b9 - () https://git.kernel.org/stable/c/42d08e97b196479f593499e887a9ab81446a34b9 - Patch
References () https://git.kernel.org/stable/c/46b9e29db2012a4d2a40a26101862e002ccf387b - () https://git.kernel.org/stable/c/46b9e29db2012a4d2a40a26101862e002ccf387b - Patch

19 Jun 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-19 15:15

Updated : 2024-10-31 13:41


NVD link : CVE-2021-47602

Mitre link : CVE-2021-47602


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-824

Access of Uninitialized Pointer