First published: Sun Oct 31 2021(Updated: )
A denial of service flaw was found in mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c in the usb subsystem of the Linux kernel. This is due to a missing clean-up for a malfunctioning usb device with an unknown recv_type.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-372.9.1.rt7.166.el8 | 0:4.18.0-372.9.1.rt7.166.el8 |
redhat/kernel | <0:4.18.0-372.9.1.el8 | 0:4.18.0-372.9.1.el8 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 | |
Linux Kernel | <=5.15.2 | |
Fedora | =34 | |
Fedora | =35 | |
Debian | =9.0 | |
Debian | =10.0 | |
Debian | =11.0 | |
netapp cloud backup | ||
All of | ||
netapp h300s firmware | ||
netapp h300s | ||
All of | ||
NetApp H500S Firmware | ||
netapp h500s | ||
All of | ||
netapp h700s firmware | ||
netapp h700s | ||
All of | ||
netapp h300e firmware | ||
netapp h300e | ||
All of | ||
netapp h500e firmware | ||
netapp h500e | ||
All of | ||
netapp h700e firmware | ||
netapp h700e | ||
All of | ||
netapp h410s firmware | ||
netapp h410s | ||
All of | ||
netapp h410c firmware | ||
netapp h410c | ||
oracle communications Cloud native core binding support function | =22.1.3 | |
oracle communications cloud native core network exposure function | =22.1.1 | |
oracle communications Cloud native core policy | =22.2.0 | |
netapp h300s firmware | ||
netapp h300s | ||
NetApp H500S Firmware | ||
netapp h500s | ||
netapp h700s firmware | ||
netapp h700s | ||
netapp h300e firmware | ||
netapp h300e | ||
netapp h500e firmware | ||
netapp h500e | ||
netapp h700e firmware | ||
netapp h700e | ||
netapp h410s firmware | ||
netapp h410s | ||
netapp h410c firmware | ||
netapp h410c |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-43976 is classified as a denial-of-service vulnerability that can lead to system disruption.
To fix CVE-2021-43976, update your kernel to version 0:4.18.0-372.9.1.rt7.166.el8 or 0:4.18.0-372.9.1.el8 for Red Hat systems.
CVE-2021-43976 affects versions of the Linux kernel up to and including 5.15.2.
Yes, CVE-2021-43976 is present in Debian Linux versions 9, 10, and 11.
Yes, CVE-2021-43976 can impact network services by causing a denial-of-service due to a malfunctioning USB device.