Overview
- Description
- In the Linux kernel, the following vulnerability has been resolved: PCI: mt7621: Add sentinel to quirks table Current driver is missing a sentinel in the struct soc_device_attribute array, which causes an oops when assessed by the soc_device_match(mt7621_pcie_quirks_match) call. This was only exposed once the CONFIG_SOC_MT7621 mt7621 soc_dev_attr was fixed to register the SOC as a device, in: commit 7c18b64bba3b ("mips: ralink: mt7621: do not use kzalloc too early") Fix it by adding the required sentinel.
- Source
- 416baaa9-dc9f-4396-8d5f-8c081fb06d67
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 5.5
- Impact score
- 3.6
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
- Severity
- MEDIUM
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2C490AF3-5FE0-4883-A850-AB2007E13585", "versionEndExcluding": "5.15.86", "versionStartIncluding": "5.4.17" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E66ABBB-C60E-481F-88C6-ED81661DFC31", "versionEndExcluding": "6.0.15", "versionStartIncluding": "5.16" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB047947-8B25-46FD-8AEA-A916F4A3DC71" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:6.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6DFB454D-4F85-4BE2-8CC9-70245EAE4D31" } ], "operator": "OR" } ] } ]