CVE-2021-47611

In the Linux kernel, the following vulnerability has been resolved: mac80211: validate extended element ID is present Before attempting to parse an extended element, verify that the extended element ID is present.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc5:*:*:*:*:*:*

History

21 Nov 2024, 06:36

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/03029bb044ccee60adbc93e70713f3ae58abc3a1 - Patch () https://git.kernel.org/stable/c/03029bb044ccee60adbc93e70713f3ae58abc3a1 - Patch
References () https://git.kernel.org/stable/c/768c0b19b50665e337c96858aa2b7928d6dcf756 - Patch () https://git.kernel.org/stable/c/768c0b19b50665e337c96858aa2b7928d6dcf756 - Patch
References () https://git.kernel.org/stable/c/7fd214fc7f2ee3a89f91e717e3cfad55f5a27045 - Patch () https://git.kernel.org/stable/c/7fd214fc7f2ee3a89f91e717e3cfad55f5a27045 - Patch
References () https://git.kernel.org/stable/c/a19cf6844b509d44ecbd536f33d314d91ecdd2b5 - Patch () https://git.kernel.org/stable/c/a19cf6844b509d44ecbd536f33d314d91ecdd2b5 - Patch
References () https://git.kernel.org/stable/c/c62b16f98688ae7bc0ab23a6490481f4ce9b3a49 - Patch () https://git.kernel.org/stable/c/c62b16f98688ae7bc0ab23a6490481f4ce9b3a49 - Patch

30 Oct 2024, 21:32

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/03029bb044ccee60adbc93e70713f3ae58abc3a1 - () https://git.kernel.org/stable/c/03029bb044ccee60adbc93e70713f3ae58abc3a1 - Patch
References () https://git.kernel.org/stable/c/768c0b19b50665e337c96858aa2b7928d6dcf756 - () https://git.kernel.org/stable/c/768c0b19b50665e337c96858aa2b7928d6dcf756 - Patch
References () https://git.kernel.org/stable/c/7fd214fc7f2ee3a89f91e717e3cfad55f5a27045 - () https://git.kernel.org/stable/c/7fd214fc7f2ee3a89f91e717e3cfad55f5a27045 - Patch
References () https://git.kernel.org/stable/c/a19cf6844b509d44ecbd536f33d314d91ecdd2b5 - () https://git.kernel.org/stable/c/a19cf6844b509d44ecbd536f33d314d91ecdd2b5 - Patch
References () https://git.kernel.org/stable/c/c62b16f98688ae7bc0ab23a6490481f4ce9b3a49 - () https://git.kernel.org/stable/c/c62b16f98688ae7bc0ab23a6490481f4ce9b3a49 - Patch
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*

20 Jun 2024, 12:43

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: mac80211: validar que el ID del elemento extendido esté presente Antes de intentar analizar un elemento extendido, verifique que el ID del elemento extendido esté presente.

19 Jun 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-19 15:15

Updated : 2024-11-21 06:36


NVD link : CVE-2021-47611

Mitre link : CVE-2021-47611

CVE.ORG link : CVE-2021-47611


JSON object : View

Products Affected

linux

  • linux_kernel