In the Linux kernel, the following vulnerability has been resolved:
cfg80211: call cfg80211_stop_ap when switch from P2P_GO type
If the userspace tools switch from NL80211_IFTYPE_P2P_GO to
NL80211_IFTYPE_ADHOC via send_msg(NL80211_CMD_SET_INTERFACE), it
does not call the cleanup cfg80211_stop_ap(), this leads to the
initialization of in-use data. For example, this path re-init the
sdata->assigned_chanctx_list while it is still an element of
assigned_vifs list, and makes that linked list corrupt.
Metrics
Affected Vendors & Products
References
History
Mon, 04 Nov 2024 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-04-10T18:56:31.361Z
Updated: 2024-12-19T07:37:11.183Z
Reserved: 2024-03-25T09:12:14.114Z
Link: CVE-2021-47194
Vulnrichment
Updated: 2024-08-04T05:32:07.292Z
NVD
Status : Modified
Published: 2024-04-10T19:15:47.807
Modified: 2024-11-21T06:35:36.263
Link: CVE-2021-47194
Redhat