In the Linux kernel, the following vulnerability has been resolved:
cfg80211: call cfg80211stopap when switch from P2P_GO type
If the userspace tools switch from NL80211IFTYPEP2PGO to NL80211IFTYPEADHOC via sendmsg(NL80211CMDSETINTERFACE), it does not call the cleanup cfg80211stopap(), this leads to the initialization of in-use data. For example, this path re-init the sdata->assignedchanctxlist while it is still an element of assignedvifs list, and makes that linked list corrupt.
[
{
"events": [
{
"introduced": "3.6.0"
},
{
"fixed": "4.4.293"
}
]
},
{
"events": [
{
"introduced": "4.5.0"
},
{
"fixed": "4.9.291"
}
]
},
{
"events": [
{
"introduced": "4.10.0"
},
{
"fixed": "4.14.256"
}
]
},
{
"events": [
{
"introduced": "4.15.0"
},
{
"fixed": "4.19.218"
}
]
},
{
"events": [
{
"introduced": "4.20.0"
},
{
"fixed": "5.4.162"
}
]
},
{
"events": [
{
"introduced": "5.5.0"
},
{
"fixed": "5.10.82"
}
]
},
{
"events": [
{
"introduced": "5.11.0"
},
{
"fixed": "5.15.5"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47194.json"