In the Linux kernel, the following vulnerability has been resolved:
mac80211: validate extended element ID is present
Before attempting to parse an extended element, verify that
the extended element ID is present.
References
Configurations
Configuration 1 (hide)
|
History
30 Oct 2024, 21:32
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.16:rc5:*:*:*:*:*:* |
|
CWE | NVD-CWE-noinfo | |
First Time |
Linux
Linux linux Kernel |
|
References | () https://git.kernel.org/stable/c/768c0b19b50665e337c96858aa2b7928d6dcf756 - Patch | |
References | () https://git.kernel.org/stable/c/03029bb044ccee60adbc93e70713f3ae58abc3a1 - Patch | |
References | () https://git.kernel.org/stable/c/7fd214fc7f2ee3a89f91e717e3cfad55f5a27045 - Patch | |
References | () https://git.kernel.org/stable/c/a19cf6844b509d44ecbd536f33d314d91ecdd2b5 - Patch | |
References | () https://git.kernel.org/stable/c/c62b16f98688ae7bc0ab23a6490481f4ce9b3a49 - Patch | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
19 Jun 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-19 15:15
Updated : 2024-10-30 21:32
NVD link : CVE-2021-47611
Mitre link : CVE-2021-47611
JSON object : View
Products Affected
linux
- linux_kernel
CWE