GSD-2021-47029

Vulnerability from gsd - Updated: 2024-02-28 06:03
Details
In the Linux kernel, the following vulnerability has been resolved: mt76: connac: fix kernel warning adding monitor interface Fix the following kernel warning adding a monitor interface in mt76_connac_mcu_uni_add_dev routine. [ 507.984882] ------------[ cut here ]------------ [ 507.989515] WARNING: CPU: 1 PID: 3017 at mt76_connac_mcu_uni_add_dev+0x178/0x190 [mt76_connac_lib] [ 508.059379] CPU: 1 PID: 3017 Comm: ifconfig Not tainted 5.4.98 #0 [ 508.065461] Hardware name: MT7622_MT7531 RFB (DT) [ 508.070156] pstate: 80000005 (Nzcv daif -PAN -UAO) [ 508.074939] pc : mt76_connac_mcu_uni_add_dev+0x178/0x190 [mt76_connac_lib] [ 508.081806] lr : mt7921_eeprom_init+0x1288/0x1cb8 [mt7921e] [ 508.087367] sp : ffffffc013a33930 [ 508.090671] x29: ffffffc013a33930 x28: ffffff801e628ac0 [ 508.095973] x27: ffffff801c7f1200 x26: ffffff801c7eb008 [ 508.101275] x25: ffffff801c7eaef0 x24: ffffff801d025610 [ 508.106577] x23: ffffff801d022990 x22: ffffff801d024de8 [ 508.111879] x21: ffffff801d0226a0 x20: ffffff801c7eaee8 [ 508.117181] x19: ffffff801d0226a0 x18: 000000005d00b000 [ 508.122482] x17: 00000000ffffffff x16: 0000000000000000 [ 508.127785] x15: 0000000000000080 x14: ffffff801d704000 [ 508.133087] x13: 0000000000000040 x12: 0000000000000002 [ 508.138389] x11: 000000000000000c x10: 0000000000000000 [ 508.143691] x9 : 0000000000000020 x8 : 0000000000000001 [ 508.148992] x7 : 0000000000000000 x6 : 0000000000000000 [ 508.154294] x5 : ffffff801c7eaee8 x4 : 0000000000000006 [ 508.159596] x3 : 0000000000000001 x2 : 0000000000000000 [ 508.164898] x1 : ffffff801c7eac08 x0 : ffffff801d0226a0 [ 508.170200] Call trace: [ 508.172640] mt76_connac_mcu_uni_add_dev+0x178/0x190 [mt76_connac_lib] [ 508.179159] mt7921_eeprom_init+0x1288/0x1cb8 [mt7921e] [ 508.184394] drv_add_interface+0x34/0x88 [mac80211] [ 508.189271] ieee80211_add_virtual_monitor+0xe0/0xb48 [mac80211] [ 508.195277] ieee80211_do_open+0x86c/0x918 [mac80211] [ 508.200328] ieee80211_do_open+0x900/0x918 [mac80211] [ 508.205372] __dev_open+0xcc/0x150 [ 508.208763] __dev_change_flags+0x134/0x198 [ 508.212937] dev_change_flags+0x20/0x60 [ 508.216764] devinet_ioctl+0x3e8/0x748 [ 508.220503] inet_ioctl+0x1e4/0x350 [ 508.223983] sock_do_ioctl+0x48/0x2a0 [ 508.227635] sock_ioctl+0x310/0x4f8 [ 508.231116] do_vfs_ioctl+0xa4/0xac0 [ 508.234681] ksys_ioctl+0x44/0x90 [ 508.237985] __arm64_sys_ioctl+0x1c/0x48 [ 508.241901] el0_svc_common.constprop.1+0x7c/0x100 [ 508.246681] el0_svc_handler+0x18/0x20 [ 508.250421] el0_svc+0x8/0x1c8 [ 508.253465] ---[ end trace c7b90fee13d72c39 ]--- [ 508.261278] ------------[ cut here ]------------
Aliases

{
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2021-47029"
      ],
      "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nmt76: connac: fix kernel warning adding monitor interface\n\nFix the following kernel warning adding a monitor interface in\nmt76_connac_mcu_uni_add_dev routine.\n\n[  507.984882] ------------[ cut here ]------------\n[  507.989515] WARNING: CPU: 1 PID: 3017 at mt76_connac_mcu_uni_add_dev+0x178/0x190 [mt76_connac_lib]\n[  508.059379] CPU: 1 PID: 3017 Comm: ifconfig Not tainted 5.4.98 #0\n[  508.065461] Hardware name: MT7622_MT7531 RFB (DT)\n[  508.070156] pstate: 80000005 (Nzcv daif -PAN -UAO)\n[  508.074939] pc : mt76_connac_mcu_uni_add_dev+0x178/0x190 [mt76_connac_lib]\n[  508.081806] lr : mt7921_eeprom_init+0x1288/0x1cb8 [mt7921e]\n[  508.087367] sp : ffffffc013a33930\n[  508.090671] x29: ffffffc013a33930 x28: ffffff801e628ac0\n[  508.095973] x27: ffffff801c7f1200 x26: ffffff801c7eb008\n[  508.101275] x25: ffffff801c7eaef0 x24: ffffff801d025610\n[  508.106577] x23: ffffff801d022990 x22: ffffff801d024de8\n[  508.111879] x21: ffffff801d0226a0 x20: ffffff801c7eaee8\n[  508.117181] x19: ffffff801d0226a0 x18: 000000005d00b000\n[  508.122482] x17: 00000000ffffffff x16: 0000000000000000\n[  508.127785] x15: 0000000000000080 x14: ffffff801d704000\n[  508.133087] x13: 0000000000000040 x12: 0000000000000002\n[  508.138389] x11: 000000000000000c x10: 0000000000000000\n[  508.143691] x9 : 0000000000000020 x8 : 0000000000000001\n[  508.148992] x7 : 0000000000000000 x6 : 0000000000000000\n[  508.154294] x5 : ffffff801c7eaee8 x4 : 0000000000000006\n[  508.159596] x3 : 0000000000000001 x2 : 0000000000000000\n[  508.164898] x1 : ffffff801c7eac08 x0 : ffffff801d0226a0\n[  508.170200] Call trace:\n[  508.172640]  mt76_connac_mcu_uni_add_dev+0x178/0x190 [mt76_connac_lib]\n[  508.179159]  mt7921_eeprom_init+0x1288/0x1cb8 [mt7921e]\n[  508.184394]  drv_add_interface+0x34/0x88 [mac80211]\n[  508.189271]  ieee80211_add_virtual_monitor+0xe0/0xb48 [mac80211]\n[  508.195277]  ieee80211_do_open+0x86c/0x918 [mac80211]\n[  508.200328]  ieee80211_do_open+0x900/0x918 [mac80211]\n[  508.205372]  __dev_open+0xcc/0x150\n[  508.208763]  __dev_change_flags+0x134/0x198\n[  508.212937]  dev_change_flags+0x20/0x60\n[  508.216764]  devinet_ioctl+0x3e8/0x748\n[  508.220503]  inet_ioctl+0x1e4/0x350\n[  508.223983]  sock_do_ioctl+0x48/0x2a0\n[  508.227635]  sock_ioctl+0x310/0x4f8\n[  508.231116]  do_vfs_ioctl+0xa4/0xac0\n[  508.234681]  ksys_ioctl+0x44/0x90\n[  508.237985]  __arm64_sys_ioctl+0x1c/0x48\n[  508.241901]  el0_svc_common.constprop.1+0x7c/0x100\n[  508.246681]  el0_svc_handler+0x18/0x20\n[  508.250421]  el0_svc+0x8/0x1c8\n[  508.253465] ---[ end trace c7b90fee13d72c39 ]---\n[  508.261278] ------------[ cut here ]------------",
      "id": "GSD-2021-47029",
      "modified": "2024-02-28T06:03:55.888926Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "cve@kernel.org",
        "ID": "CVE-2021-47029",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "Linux",
                    "version": {
                      "version_data": [
                        {
                          "version_affected": "\u003c",
                          "version_name": "d0e274af2f2e",
                          "version_value": "2554b9cb4b5e"
                        },
                        {
                          "version_value": "not down converted",
                          "x_cve_json_5_version_data": {
                            "defaultStatus": "affected",
                            "versions": [
                              {
                                "status": "affected",
                                "version": "5.12"
                              },
                              {
                                "lessThan": "5.12",
                                "status": "unaffected",
                                "version": "0",
                                "versionType": "custom"
                              },
                              {
                                "lessThanOrEqual": "5.12.*",
                                "status": "unaffected",
                                "version": "5.12.4",
                                "versionType": "custom"
                              },
                              {
                                "lessThanOrEqual": "*",
                                "status": "unaffected",
                                "version": "5.13",
                                "versionType": "original_commit_for_fix"
                              }
                            ]
                          }
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "Linux"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmt76: connac: fix kernel warning adding monitor interface\n\nFix the following kernel warning adding a monitor interface in\nmt76_connac_mcu_uni_add_dev routine.\n\n[  507.984882] ------------[ cut here ]------------\n[  507.989515] WARNING: CPU: 1 PID: 3017 at mt76_connac_mcu_uni_add_dev+0x178/0x190 [mt76_connac_lib]\n[  508.059379] CPU: 1 PID: 3017 Comm: ifconfig Not tainted 5.4.98 #0\n[  508.065461] Hardware name: MT7622_MT7531 RFB (DT)\n[  508.070156] pstate: 80000005 (Nzcv daif -PAN -UAO)\n[  508.074939] pc : mt76_connac_mcu_uni_add_dev+0x178/0x190 [mt76_connac_lib]\n[  508.081806] lr : mt7921_eeprom_init+0x1288/0x1cb8 [mt7921e]\n[  508.087367] sp : ffffffc013a33930\n[  508.090671] x29: ffffffc013a33930 x28: ffffff801e628ac0\n[  508.095973] x27: ffffff801c7f1200 x26: ffffff801c7eb008\n[  508.101275] x25: ffffff801c7eaef0 x24: ffffff801d025610\n[  508.106577] x23: ffffff801d022990 x22: ffffff801d024de8\n[  508.111879] x21: ffffff801d0226a0 x20: ffffff801c7eaee8\n[  508.117181] x19: ffffff801d0226a0 x18: 000000005d00b000\n[  508.122482] x17: 00000000ffffffff x16: 0000000000000000\n[  508.127785] x15: 0000000000000080 x14: ffffff801d704000\n[  508.133087] x13: 0000000000000040 x12: 0000000000000002\n[  508.138389] x11: 000000000000000c x10: 0000000000000000\n[  508.143691] x9 : 0000000000000020 x8 : 0000000000000001\n[  508.148992] x7 : 0000000000000000 x6 : 0000000000000000\n[  508.154294] x5 : ffffff801c7eaee8 x4 : 0000000000000006\n[  508.159596] x3 : 0000000000000001 x2 : 0000000000000000\n[  508.164898] x1 : ffffff801c7eac08 x0 : ffffff801d0226a0\n[  508.170200] Call trace:\n[  508.172640]  mt76_connac_mcu_uni_add_dev+0x178/0x190 [mt76_connac_lib]\n[  508.179159]  mt7921_eeprom_init+0x1288/0x1cb8 [mt7921e]\n[  508.184394]  drv_add_interface+0x34/0x88 [mac80211]\n[  508.189271]  ieee80211_add_virtual_monitor+0xe0/0xb48 [mac80211]\n[  508.195277]  ieee80211_do_open+0x86c/0x918 [mac80211]\n[  508.200328]  ieee80211_do_open+0x900/0x918 [mac80211]\n[  508.205372]  __dev_open+0xcc/0x150\n[  508.208763]  __dev_change_flags+0x134/0x198\n[  508.212937]  dev_change_flags+0x20/0x60\n[  508.216764]  devinet_ioctl+0x3e8/0x748\n[  508.220503]  inet_ioctl+0x1e4/0x350\n[  508.223983]  sock_do_ioctl+0x48/0x2a0\n[  508.227635]  sock_ioctl+0x310/0x4f8\n[  508.231116]  do_vfs_ioctl+0xa4/0xac0\n[  508.234681]  ksys_ioctl+0x44/0x90\n[  508.237985]  __arm64_sys_ioctl+0x1c/0x48\n[  508.241901]  el0_svc_common.constprop.1+0x7c/0x100\n[  508.246681]  el0_svc_handler+0x18/0x20\n[  508.250421]  el0_svc+0x8/0x1c8\n[  508.253465] ---[ end trace c7b90fee13d72c39 ]---\n[  508.261278] ------------[ cut here ]------------"
          }
        ]
      },
      "generator": {
        "engine": "bippy-1e70cc10feda"
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "n/a"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://git.kernel.org/stable/c/2554b9cb4b5e097c6071ec3ed5bc7c665c477ca7",
            "refsource": "MISC",
            "url": "https://git.kernel.org/stable/c/2554b9cb4b5e097c6071ec3ed5bc7c665c477ca7"
          },
          {
            "name": "https://git.kernel.org/stable/c/c996f0346e40e3b1ac2ebaf0681df898fb157f60",
            "refsource": "MISC",
            "url": "https://git.kernel.org/stable/c/c996f0346e40e3b1ac2ebaf0681df898fb157f60"
          }
        ]
      }
    },
    "nvd.nist.gov": {
      "cve": {
        "descriptions": [
          {
            "lang": "en",
            "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmt76: connac: fix kernel warning adding monitor interface\n\nFix the following kernel warning adding a monitor interface in\nmt76_connac_mcu_uni_add_dev routine.\n\n[  507.984882] ------------[ cut here ]------------\n[  507.989515] WARNING: CPU: 1 PID: 3017 at mt76_connac_mcu_uni_add_dev+0x178/0x190 [mt76_connac_lib]\n[  508.059379] CPU: 1 PID: 3017 Comm: ifconfig Not tainted 5.4.98 #0\n[  508.065461] Hardware name: MT7622_MT7531 RFB (DT)\n[  508.070156] pstate: 80000005 (Nzcv daif -PAN -UAO)\n[  508.074939] pc : mt76_connac_mcu_uni_add_dev+0x178/0x190 [mt76_connac_lib]\n[  508.081806] lr : mt7921_eeprom_init+0x1288/0x1cb8 [mt7921e]\n[  508.087367] sp : ffffffc013a33930\n[  508.090671] x29: ffffffc013a33930 x28: ffffff801e628ac0\n[  508.095973] x27: ffffff801c7f1200 x26: ffffff801c7eb008\n[  508.101275] x25: ffffff801c7eaef0 x24: ffffff801d025610\n[  508.106577] x23: ffffff801d022990 x22: ffffff801d024de8\n[  508.111879] x21: ffffff801d0226a0 x20: ffffff801c7eaee8\n[  508.117181] x19: ffffff801d0226a0 x18: 000000005d00b000\n[  508.122482] x17: 00000000ffffffff x16: 0000000000000000\n[  508.127785] x15: 0000000000000080 x14: ffffff801d704000\n[  508.133087] x13: 0000000000000040 x12: 0000000000000002\n[  508.138389] x11: 000000000000000c x10: 0000000000000000\n[  508.143691] x9 : 0000000000000020 x8 : 0000000000000001\n[  508.148992] x7 : 0000000000000000 x6 : 0000000000000000\n[  508.154294] x5 : ffffff801c7eaee8 x4 : 0000000000000006\n[  508.159596] x3 : 0000000000000001 x2 : 0000000000000000\n[  508.164898] x1 : ffffff801c7eac08 x0 : ffffff801d0226a0\n[  508.170200] Call trace:\n[  508.172640]  mt76_connac_mcu_uni_add_dev+0x178/0x190 [mt76_connac_lib]\n[  508.179159]  mt7921_eeprom_init+0x1288/0x1cb8 [mt7921e]\n[  508.184394]  drv_add_interface+0x34/0x88 [mac80211]\n[  508.189271]  ieee80211_add_virtual_monitor+0xe0/0xb48 [mac80211]\n[  508.195277]  ieee80211_do_open+0x86c/0x918 [mac80211]\n[  508.200328]  ieee80211_do_open+0x900/0x918 [mac80211]\n[  508.205372]  __dev_open+0xcc/0x150\n[  508.208763]  __dev_change_flags+0x134/0x198\n[  508.212937]  dev_change_flags+0x20/0x60\n[  508.216764]  devinet_ioctl+0x3e8/0x748\n[  508.220503]  inet_ioctl+0x1e4/0x350\n[  508.223983]  sock_do_ioctl+0x48/0x2a0\n[  508.227635]  sock_ioctl+0x310/0x4f8\n[  508.231116]  do_vfs_ioctl+0xa4/0xac0\n[  508.234681]  ksys_ioctl+0x44/0x90\n[  508.237985]  __arm64_sys_ioctl+0x1c/0x48\n[  508.241901]  el0_svc_common.constprop.1+0x7c/0x100\n[  508.246681]  el0_svc_handler+0x18/0x20\n[  508.250421]  el0_svc+0x8/0x1c8\n[  508.253465] ---[ end trace c7b90fee13d72c39 ]---\n[  508.261278] ------------[ cut here ]------------"
          }
        ],
        "id": "CVE-2021-47029",
        "lastModified": "2024-02-28T14:06:45.783",
        "metrics": {},
        "published": "2024-02-28T09:15:39.480",
        "references": [
          {
            "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
            "url": "https://git.kernel.org/stable/c/2554b9cb4b5e097c6071ec3ed5bc7c665c477ca7"
          },
          {
            "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
            "url": "https://git.kernel.org/stable/c/c996f0346e40e3b1ac2ebaf0681df898fb157f60"
          }
        ],
        "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "vulnStatus": "Awaiting Analysis"
      }
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…